Threat modeling is a process that far few developers seem to pursue, but it is a process that helps you and your team to model all potential threats to your application. Essentially, threat modeling is your thinking through all of the potential threats against an application. Doing so is virtually as easy as putting together […]
0 CommentsThe post Fear of Abandonment appeared first on DevOps.com. Source: DevOps.com
0 CommentsAt the cornerstone of any successful DevOps transformation is effective communication between all members in an organization, from the business leaders, IT leaders, middle management and out to each individual member on their teams. Yet, so many times in organizational change, we see a monumental communication breakdowns occur. So it’s no surprise that every year […]
0 CommentsStateless application architecture is the current de facto approach, right? Not necessarily. Stateful applications communicating over TCP sockets can and are successfully built even in today’s age of cloud-native applications. Our guest on this episode of DevOps Chat is Chris McCord, creator of the Phoenix open source software, and architectural engineer at DockYard. Chris came […]
0 CommentsI’m a terrible video game player. For as much fun as people have with me at the table for Table Top RPGs (TTRPGs), I’m a pain when playing video games. As a guy with a masters in computer science, and years of experience ranging from embedded drivers to enterprise architecture, I see bugs or bad […]
0 CommentsThe post The Iceberg of Software Development appeared first on DevOps.com. Source: DevOps.com
0 CommentsAt AWS re:Invent 2018, we announced a new line of Amazon Elastic Compute Cloud (EC2) instances: the A1 family, powered by Arm-based AWS Graviton processors. This family is a great fit for scale-out workloads e.g. web front-ends, containerized microservices or caching fleets. By expanding the choice of compute options, A1 instances help customers use the […]
0 CommentsAWS customers build ever-demanding applications on Amazon EC2. To support them the best we can, we listen to their requirements, go to work, and come up with new capabilities. For instance, in 2018, we upgraded the networking capabilities of Amazon EC2 C5 instances, with up to 100 Gbps networking, and significant improvements in packet processing […]
0 CommentsI introduced you to AWS Firewall Manager last year, and showed you how you can use it to centrally configure and manage your AWS WAF rules and AWS Shield advanced protections. AWS Firewall Manager makes use of AWS Organizations, and lets you build policies and apply them across multiple AWS accounts in a consistent manner. […]
0 CommentsSAN JOSE, Calif.–(BUSINESS WIRE)–CloudBees, the enterprise DevOps leader powering the continuous economy, today launched a new partner program that expands ISV partners’ ability to align with CloudBees offerings and the global Jenkins community. The Technical Alliance Partner Program (TAPP) will energize CloudBees’ partner ecosystem with new programs and tighter connections, helping ISVs create new revenue streams and […]
0 Comments