Just as DevOps emerged to meet new business needs, new approaches in security are now needed to address the challenges of a DevOps-driven world. These new security approaches themselves must incorporate DevOps practices that rely on modularity, automation, standardization, auditability, and mirrored systems.
Egyptian ride hailing provider Ousta has two mobile apps which interact with an event driven architecture using microservices. The combination of EDA and microservices facilitated a simulation system for automation, and a rapid development and testing cycle.
This article describes two novel practices for continuous delivery: Latent-to-live code pattern and Forward compatible interim versions. You can use these practices to simultaneously increase speed and reliability of software development and reduce risks. These practices are built on top of two other essential continuous delivery practices: trunk-based-development and feature toggles.
Software developers can raise their consciousness through the use of disciplined technical practices. A knowledgeable developer can influence an ever-increasing portion of the world.
It is not Agile's fault, it is your fault- are you fed up with such statements? This article tries to provide a more constructive answer on how to make Agile successful. 13
JUnit 5 is coming! In part 1 of our JUnit 5 coverage we wrote some preliminary tests. In part 2, we take a closer look at how to run tests, and some of the cool features JUnit 5 brings to the table. 6
We review the book Infrastructure as Code by Kief Morris, who lays down the foundation for Infrastructure as Code and outlines the main patterns and practices recommended for building it.
Mirco Hering explains why we shouldn't leave COTS products (and the people working on them) left behind in a DevOps world. With creative solutions we can apply good practices from custom software.
Knysa is a PhantomJS library that uses async-await style programming to get rid of callback hell. Creator Bo Zou shows how to create your own tests with knysa. 1
The article discusses a catalog of configuration smells, provides a few examples of such smells along with corresponding refactorings, and lists a few tools that could be used to reveal such smells. 2
With the fast-pace of cloud changes, cloud lock-in remains a popular refrain. But what does it mean, and how can you ensure you're maximizing your cloud investment while keeping portability in mind?
Consultants play a major role in helping companies deliver software. How do these consultants tackle lock-in and build portable solutions? In this interview, OpenCredo's Nicki Watt tackles this topic.