John Kordyback explains why you should and how you can introduce Continuous Delivery into a typical enterprise, where dozens of systems adopted over the years generate massive complexity. Learn how value-stream mapping and Lean Startup thinking help to create a deployment process which serves as a solid foundation for further improvements on the whole software change lifecycle.
This article summarizes the key takeaways and highlights from QCon London 2014 as blogged and tweeted by attendees. Over the course of the next 4 months, InfoQ will be publishing most of the conference sessions online, including 27 video interviews that were recorded by the InfoQ editorial team. The publishing schedule can be found on the QCon London web site.
As mobility is transforming our lives, this article gives a step-by-step approach on how enterprises can seamlessly connect their mobile workforce to back-end systems for increased productivity. Covering topics like business goal definition, API and data security or user experience it provides a broad overview on what to keep in mind while planning an enterprise mobility strategy.
Andrew Phillips and Jenkins creator Kohsuke Kawaguchi review state-of-the-art plugins and solutions in the Jenkins ecosystem for achieving efficient, reproducible and secure delivery pipelines.
Approximately 60% of all computers sold worldwide today are portable, making them an easy target for criminals. How can your personal data be protected? With one word - encryption! 2
InfoQ reached out to experienced ops engineers to ask them what is “Immutable Infrastructure”, its borders as well as its benefits and drawbacks, in particular compared to desired state convergence. 1
This article provides an overview of tools and libraries available for embedded data analytics & statistics, both stand-alone software packages and programming languages with statistical capabilities.
Philipp K. Janert explains how to reliably auto-scale systems using a reactive approach based on feedback control which provides a more accurate solution than deterministic or rule-based ones.
The second edition of Stephen Nelson-Smith's book "Test-Driven Infrastructure with Chef" describes a testing workflow and tools for writing fully tested infrastructure code
With the news stories of possible data breaches at enterprises like Target, and companies migrating to cloud environments, CIOs have been asking hard questions about cloud security. 2
In this article, authors discuss the role of big data and Hadoop in security analytics space and how to use MapReduce to process data for security analysis.
Yaniv Yehuda looks at the challenges involved in automating database deployments and offer suggestions based on Agile and DevOps concepts. 6