Glen Knight

NYC Based IT Professional

Let Your IPv6-only Workloads Connect to IPv4 Services

Today we are announcing two new capabilities for Amazon Virtual Private Cloud (VPC) NAT gateway and Amazon Route 53, allowing your IPv6-only workloads to transparently communicate with IPV4-only services. Curious? Read on; I have details for you. Some of you are running very large workloads involving tens of thousands of virtual machines, containers, or micro-services. […]

0 Comments

Read More

How to Build an Effective API Security Strategy

Application Programming Interfaces (APIs) enable organizations to grow their businesses and drive innovation. APIs allow applications to easily transfer data to external third-party developers, business partners and internal departments. Since APIs have access to valuable and sensitive data, they have increasingly become a target for cyberattacks. At the API Security Summit, taking place on March […]

0 Comments

Read More

What to Expect When Transitioning to DevSecOps

How do you ensure your DevOps pipeline is secure? Does DevSecOps protect you against serious breaches or is it just a way to allay the concerns of stakeholders about security in DevOps? A data breach can cost an average of $3.92 million USD, as per IBM’s study Cost of a Data Breach. In this report, […]

0 Comments

Read More

Configuration Management

The post Configuration Management appeared first on DevOps.com. Source: DevOps.com

0 Comments

Read More

Tricentis Expands Scope of Cloud-Based Testing Tools

Tricentis this week extended a suite of cloud-based testing tools that promise to make it simpler to both develop cloud-native and mobile applications and migrate existing applications to the cloud. New capabilities added to the portfolio include integrations for cloud-based planning tools and a wider range of testing capabilities for mobile applications. DevOps teams can […]

0 Comments

Read More

New – Additional Checksum Algorithms for Amazon S3

Amazon Simple Storage Service (Amazon S3) is designed to provide 99.999999999% (11 9s) of durability for your objects and for the metadata associated with your objects. You can rest assured that S3 stores exactly what you PUT, and returns exactly what is stored when you GET. In order to make sure that the object is […]

0 Comments

Read More

How SREs Benefit From Feature Flags

When you think of who uses feature flags, your mind most likely goes to software developers. In general, feature flags are closely associated with software engineering. But site reliability engineers (SREs), too, can benefit. SREs may not be the ones to create feature flags, but they should work closely with developers to ensure that the […]

0 Comments

Read More

SQL Server MDF to NDF Distribution

Do you have massive MDF files on your database? Have you noticed that your SQL Server disk stall metrics for these data files are higher than the storage latency metrics exhibited on the underlying operating system? It could be that your SQL Server data files are being hammered too hard and you don’t have enough […]

0 Comments

Read More

Akamai: Buying Linode | Firefox: Not OK | Gone: Google Vaccine Mandate

In this week’s The Long View: Linode bought by Akamai, Firefox market share “measly,” and Google brings staff back to the office. The post Akamai: Buying Linode | Firefox: Not OK | Gone: Google Vaccine Mandate appeared first on DevOps.com. Source: DevOps.com

0 Comments

Read More

How to Mitigate Software Supply Chain Risks

As new vulnerabilities are discovered on a daily basis, DevOps teams must integrate security into the early stages of the development lifecycle and be vigilant about what elements are incorporated into their applications. The Log4J vulnerability has dominated the headlines since it was discovered in December and it continues to send shock waves through the […]

0 Comments

Read More