When assessing technology that empowers a DevOps transformation, it’s easy to focus in on the headline capabilities (“configuration management!”) and miss out on the bigger picture. How can teams shipping cloud (or on-premises) applications use the full suite of DevOps technologies to simplify delivery and management at scale? This article classifies and explains key enabling technologies.
Mobile operations management (MOM) is one of the top priorities of today’s modern enterprise. While the first generation of MOM solutions evolved around the management of mobile devices and applications, organizations have quickly realized that an effective enterprise mobile infrastructure requires addressing a more difficult challenge: managing and securing mobile business data.
Currently, Antifragility and Microservices are trending topics and this might be a hint that there are new architectural paradigms or design patterns on their way for building application systems.. We're discussing these new concepts with Russ Miles to find out what they are good for and how to apply them in an architect's or developer's daily business - for existing applications and those to come
"In Search of Certainty", written by CFEngine's creator, Mark Burgess, takes us into a journey through physics and biology and how it relates to the information infrastructure realm.
John Kordyback explains why you should and how you can introduce Continuous Delivery into a typical enterprise, where dozens of systems adopted over the years generate massive complexity. 4
This article summarizes the key takeaways and highlights from QCon London 2014 as blogged and tweeted by attendees.
As mobility is transforming our lives, this article gives a step-by-step approach on how enterprises can seamlessly connect their mobile workforce to back-end systems for increased productivity.
Andrew Phillips and Jenkins creator Kohsuke Kawaguchi review state-of-the-art plugins and solutions in the Jenkins ecosystem for achieving efficient, reproducible and secure delivery pipelines.
Approximately 60% of all computers sold worldwide today are portable, making them an easy target for criminals. How can your personal data be protected? With one word - encryption! 2
InfoQ reached out to experienced ops engineers to ask them what is “Immutable Infrastructure”, its borders as well as its benefits and drawbacks, in particular compared to desired state convergence. 1
This article provides an overview of tools and libraries available for embedded data analytics & statistics, both stand-alone software packages and programming languages with statistical capabilities.
Philipp K. Janert explains how to reliably auto-scale systems using a reactive approach based on feedback control which provides a more accurate solution than deterministic or rule-based ones.