Security. Cloud. Two words that are almost always together but rarely happily. Read on to learn why that isn’t the case and what you need to known about securing your critical infrastructure in the cloud.
Michael DeHaan, creator of Ansible, introduces the general-purpose IT automation system. He describes the tool’s guiding principles: simplicity, ease of use and maximum security. The philosophy behind its community is also discussed, including the importance of Ansible’s plugin-based model. Michael uses a simple but common scenario to demonstrate Ansible.
When assessing technology that empowers a DevOps transformation, it’s easy to focus in on the headline capabilities (“configuration management!”) and miss out on the bigger picture. How can teams shipping cloud (or on-premises) applications use the full suite of DevOps technologies to simplify delivery and management at scale? This article classifies and explains key enabling technologies.
Mobile operations management is one of the top priorities of modern enterprise and after establishing solutions for device management, the next challenge is to manage and secure mobile business data.
Currently, Antifragility and Microservices are trending topics and this might be a hint that there are new architectural paradigms or design patterns on their way for building application systems.
"In Search of Certainty", written by CFEngine's creator, Mark Burgess, takes us into a journey through physics and biology and how it relates to the information infrastructure realm.
John Kordyback explains why you should and how you can introduce Continuous Delivery into a typical enterprise, where dozens of systems adopted over the years generate massive complexity. 4
This article summarizes the key takeaways and highlights from QCon London 2014 as blogged and tweeted by attendees.
As mobility is transforming our lives, this article gives a step-by-step approach on how enterprises can seamlessly connect their mobile workforce to back-end systems for increased productivity.
Andrew Phillips and Jenkins creator Kohsuke Kawaguchi review state-of-the-art plugins and solutions in the Jenkins ecosystem for achieving efficient, reproducible and secure delivery pipelines.
Approximately 60% of all computers sold worldwide today are portable, making them an easy target for criminals. How can your personal data be protected? With one word - encryption! 2
InfoQ reached out to experienced ops engineers to ask them what is “Immutable Infrastructure”, its borders as well as its benefits and drawbacks, in particular compared to desired state convergence. 1