Curated articles, resources, tips and trends from the DevOps World.
After more than a decade of planning and innovation, the tech world is standing on the cusp of the era of exascale computing. And if Intel has its way, the era won’t be very long.
For some time, the best practice amongst HashiCorp Packer users has been to use shell and shell-local provisioners to execute tools such as Chef, InSpec, Puppet, and Salt. However, due to early first-class integrations, we have maintained plugins for such tools for more than four years.
In this post, we’ll talk about what the Ruby programming language is and why it’s a popular language for many developers in the cloud. We’ll give an overview of the differences between Ruby vs Ruby on Rails and Ruby vs Python, and talk about what Ruby can be used for.
This week, ACG was at Microsoft Ignite, which was in the cloud. That’s right, it was a 48-hour online event that showcased all of Microsoft’s latest products and services.
Styra sponsored this post. Least hot take of all time: Interruptions and rework are the worst. The modern dev pipeline is purpose-built to make collaboration easier and allow individuals and teams to work together to contribute to regular code pushes.
PagerDuty sponsored this post. Launching new software into production can be a tricky experience. While we strive to make our non-production environments as close to production as possible, there’s always a compromise or two that means the integration environment isn’t exactly like production.
Today, an extremely centralized internet affects many aspects of our daily lives, thanks to the massive amounts of user data being controlled by a few big tech players like Facebook and Google.
The Nuremberg-based SUSE wants to be the enterprise open source software provider for big data operations. The company maintains one of the premier Linux distributions for corporations, the Linux Enterprise Server. It’s also an important driving force within the realm of cloud native technology.
What is a Keylogger? A keylogger is a type of spyware that monitors and records user keystrokes. They allow cybercriminals to read anything a victim is typing into their keyboard, including private data like passwords, account numbers, and credit card numbers.
Critical business applications are monitored in order to prevent anomalies from negatively impacting their operational performance and availability.
Have valuable insights to share with the DevOps community? Submit your article for publication.
Get the latest DevOps news, tools, and insights delivered to your inbox.
Made with pure grit © 2025 Jetpack Labs Inc. All rights reserved. www.jetpacklabs.com