Glen Knight

NYC Based IT Professional

Four Ways to Modernize Your Enterprise Monoliths

In a perfect world, every application would run like Netflix–by which I mean every application would be cloud-native, microservices-based, containerized and, in all other senses of the word, modern. Unfortunately, not every application can be transformed in these ways. Some of the most important enterprise applications–like those powered by SAP or Oracle–don’t lend themselves to […]

0 Comments

Read More

How Open Source Can Enhance Developer Experience

Developer experience (DX) is becoming more and more of a competitive advantage among developer-facing tools and platforms. A great developer experience that’s easy to follow and implement can truly help a software tool stand out from the crowd. Simultaneously, open source software is all the rage. In fact, a recent StackOverflow survey found open source […]

0 Comments

Read More

BMC Adds Generative AI Capabilities to Helix Management Platform

BMC today revealed it is embedding generative artificial intelligence (AI) capabilities across its BMC Helix service and operations management platforms. BMC CTO Ram Chakravarti said the company is incorporating the open source GPT-J large language models (LLMS) to build generative AI models. Those models are optimized for specific domains using data collected by BMC and […]

0 Comments

Read More

It Is Time for DevOps to Focus on Ops

The advent of both Agile development and DevOps were great steps in improving an IT process that had become ossified, with policies that alternated between resistance to change and trying to do things better/faster. Between them, Agile and DevOps broke the cycle of resistance … but only for development. The confusion around CI/CD is a […]

0 Comments

Read More

HashiCorp Releases Slew of Updates to Improve DevSecOps

At a HashiDays event this week, HashiCorp launched updates to its Terraform implementation and a software-as-a-service offering, dubbed HCP Vault Secrets, that promise to simplify infrastructure security and ensure that secrets are not leaked. In addition, HashiCorp has added a self-hosted edition of its remote access security tool, Boundary, that can now also record SSH […]

0 Comments

Read More

Grafana Labs Slashes Time to Create Observability Dashboards

At its GrafanaCON 2023 event today, Grafana Labs updated its core platform for visualizing data which makes it simpler to set up dashboards in minutes. The updates are part of a celebration of the 10th anniversary of a tool that is now widely used by DevOps teams. Ryan McKinley, a distinguished engineer for Grafana Labs, […]

0 Comments

Read More

The Tragedy of the Data Commons: Balancing Innovation With Risk

Clean drinking water and fisheries are classic examples of the “tragedy of the commons,” the problem in economics and ecology where an individual is incentivized to consume as much of a shared resource as possible at the expense of the larger society. With fisheries, for example, a logical fisherman would like to make as many […]

0 Comments

Read More

Avoiding the Pain of a ‘Resume-Driven Architecture’

Successful new technologies follow a predictable arc, from initial innovation to technical gold rush and, ultimately, to mass market adoption. As a consequence, they achieve strong standardization and productization. Being highly attuned to where a specific field lies on the maturity arc is how you yield the greatest benefits to a business. But what happens […]

0 Comments

Read More

Leading DevOps Transformations With AI

In my recent article Revolutionizing the Nine Pillars of DevOps with AI-Engineered Tools, I explained that AI-engineered tools can help with automating repetitive tasks, improving decision-making with predictive insights and facilitating proactive issue resolution. AI can drive a higher level of quality, security and performance in the software life cycle. Leadership, the first of the […]

0 Comments

Read More

Cycode Leverages eBPF to Secure CI/CD Pipelines

Cycode today added a Cimon extension to its application security platform that uses extended Berkeley Packet Filtering (eBPF) to thwart cyberattacks against continuous integration/continuous delivery (CI/CD) pipelines. Alex Ilgayev, head of security research for Cycode, said Cimon uses eBPF to inspect network connections, running processes and file modifications within a pipeline to learn standard behaviors. […]

0 Comments

Read More