Curated articles, resources, tips and trends from the DevOps World.
Rafael Sweary Rafael Sweary is the co-founder and president of WalkMe. He envisioned the Digital Adoption Platform, a strategic component of digital transformation in a world where technology adapts to people, creating positive digital relationships.
Trouble here, trouble there, it’s trouble, trouble everywhere in cloud security in 2022. We all know that, but the Cloud Security Alliance (CSA) spells out exactly where the security thunderstorms are today.
Heading into Apple’s annual developer conference, WWDC, there were rumors that a “mixed reality” AR/VR headset would dominate the event — even though the hardware itself wasn’t expected to be revealed. Others predicted that Apple would launch a new 3D development environment.
DeFi (decentralized finance) is the wild west of Web3. In 2021 alone, DeFi users lost a staggering $10.5 billion to theft, fraud, and other nefarious schemes like rug pulls.
Colin Barker is co-presenting a LinkedIn Live Event looking at reasons why cloud migrations fail, and how to avoid them. As one of our Cloud Solutions Architects and an AWS Ambassador, Colin has planned and orchestrated many complex migrations.
ScyllaDB sponsored this post.
Hashicorp sponsored this post. Infrastructure provisioning can still sometimes feel like an endless loop of reinventing the wheel, unless you have the right process and capabilities in place.
Emma Haruka Iwao knows — because she led the first team that ever calculated every single digit. After running calculations for 157 days, 23 hours, 31 minutes and 7.651 seconds, their big moment arrived when it was time to check.
The threat landscape means the entire scope of potential and recognized cybersecurity threats affecting user groups, organizations, specific industries, or a particular time. As new cyber threats emerge daily, the threat landscape changes accordingly.
A data breach occurs when sensitive data is copied, transmitted, viewed, stolen, or accessed by an unauthorized individual. For a security incident to constitute a data breach, the exposure of sensitive data must be intentional.
Have valuable insights to share with the DevOps community? Submit your article for publication.
Get the latest DevOps news, tools, and insights delivered to your inbox.
Made with pure grit © 2025 Jetpack Labs Inc. All rights reserved. www.jetpacklabs.com