Curated articles, resources, tips and trends from the DevOps World.
Insider threats are one of the biggest internal cyber threats to organizations because they are often detected too late, and the responsible individual has access to sensitive information that gets released or exposed.
The big news from Sumo Logic, coming out of at KubeCon+CloudNativeCon Europe 2023 in Amsterdam this week, is that the observability company is going all in on OpenTelemetry, according to Erez Barak, Sumo Logic’s vice president of product development for observability.
Last year, the Cloud Foundry Community returned to in-person events at KubeCon+CloudNativeCon NA 2022 held in Detroit.
As Kubernetes expands out from the domain of super-users (the internet-scale companies) and towards the enterprise, the cost of running Kubernetes clusters becomes an increasingly important factor in many operations. But how do you measure K8s usage on a per-dollar basis?
Using functions in the cloud is a very efficient way of creating iterable workflows that can transform data, analyze source code, make platform configurations, and do many other useful jobs. As you develop a function you will quickly realize a need for a solid foundation of utilities and formatting.
AMSTERDAM – As platform engineering becomes a more widely adopted discipline, the platform team’s to-do list only increases. And as developers adopt new best practices and tools, that team needs to upskill and understand more and more of the distributed, often seven-layer stack.
Databases power all modern applications. They’re behind your Angry Birds mobile game as much as they’re behind the space shuttle. In the beginning, databases were hosted on a single physical machine. Basically, it was a computer running only one program: the database.
The metaverse hype was a dominant storyline in the tech industry over 2022. But after the initial loud posturing of Meta (née Facebook), it dawned on the industry that in order for the metaverse to succeed, open standards would need to be defined and alliances formed around those standards.
Security breaches — of cloud environments, of the software supply chain — are growing ever more common. But most organizations still struggle to master the basics needed to keep their applications, data and infrastructure safe, according to a new report released Tuesday.
Leaving aside Twitter owner Elon Musk‘s latest 13-year-old boy joke of “renaming” Twitter, “Titter,” Twitter’s most serious new annoyance is its new API pricing structure. It’s both irritating developers and driving some of them out of business.
Have valuable insights to share with the DevOps community? Submit your article for publication.
Get the latest DevOps news, tools, and insights delivered to your inbox.
Made with pure grit © 2026 Jetpack Labs Inc. All rights reserved. www.jetpacklabs.com