InfoQ Homepage DevOps Content on InfoQ
-
Failing Fast: the Impact of Bias When Speeding up Application Security
This article deals with three biases people can have with establishing application security while trying to move fast in building them, attitude which can cost the organization later, showing how to spot the biases, and providing advice on what to do about them.
-
Are Canary Releases an Alternative to Testers?
Canary releases enable product owners to check how a new feature is getting adopted by users by rolling it out to a small percentage of users and then incrementally rolling it out to a wider audience. Product owners might feel tempted to discontinue or reduce testing upon adopting canary releases, but decisions should be approached cautiously as they can have serious and unintended consequences.
-
Serverless Solution to Offload Polling for Asynchronous Operation Status Using Amazon S3
This article proposes a solution to redirect the polling part to the Amazon Simple Storage Service (S3) - a highly available, scalable, and secured object storage service managed by Amazon Web Services public cloud provider (AWS). It will present a serverless implementation using AWS Lambda functions, but this is not mandatory if you want to use S3.
-
Application Security Manager: Developer or Security Officer?
The role of the Application Security Manager (ASM) should be the driving force of the overall code review process. An ASM should know about development processes, information security principles, and have solid technical skills. To get a good ASM you can either use experts from a service provider or grow an in-house professional from developers or security specialists.
-
Engineering Digital Transformation for Continuous Improvement
Engineering The Digital transformation leverages manufacturing's successful track record of improving productivity and quality and organizational change management principles. It's a training program designed to reduce the barriers to change, enable teams to understand good design patterns, and ultimately allow organizations to create a systematic approach to continuous improvement.
-
Why the Future of Monitoring Is Agentless
Traditionally, monitoring software has relied heavily on agent-based approaches for extracting telemetry data from systems. Observability requires better telemetry than agents currently provide. OpenTelemetry is driving advances in this area by creating a standard format and APIs to create, transmit, and store telemetry data. This unlocks new opportunities in observability.
-
Mobile DevSecOps Is the Road to Mobile Security
In this article, I’ll discuss some of the most common security deficiencies in mobile apps and explain the potential risks to consumers, app developers, and brands, as well how to break the cycle of poor app security, using automated, rapid, continuous, and iterative deployment.
-
Is Artificial Intelligence Taking over DevOps?
AI tools are slowly replacing the role of the developer – just as DevOps did before – and will eventually supplant DevOps entirely. Assessing whether that prediction is true is tricky. In this article, we’ll look at what AI promises for the development process, assess whether it can really ever take over from human developers, and what DevOps is likely to look like in a decades’ time.
-
Using Cloud Native Buildpacks to Address Security Requirements for the Software Supply Chain
Software supply chain attacks are increasing in severity and frequency, with no clear path laid out towards its mitigation. A simple way to trace the origin of vulnerable components is available in the form of Software Bill Of Materials (SBOMs), generated automatically when using Buildpacks.
-
Virtual Panel: DevSecOps and Shifting Security Left
Recent attacks, that targeted SolarWinds, Colonial Pipeline, and others, have shown that development environments come ever more frequently on the radar of malicious actors. A virtual panel on the value of shifting left security, how to take responsibility for it, and the time-to-market pitfalls.
-
How Unnecessary Complexity Gave the Service Mesh a Bad Name
There is immense value in adopting a service mesh, but it must be done in a lightweight manner to avoid unnecessary complexity. Take a pragmatic approach when implementing a service mesh by aligning with the core features of the technology, such as standardized monitoring and smart routing, and watching out for distractions.
-
Ballerina Swan Lake: 10 Compelling Language Characteristics for Cloud Native Programming
The Ballerina language has come a long way with significant improvements since the 1.0 release in 2019. The latest Swan Lake release further simplifies building and deploying cloud native apps.