BT

Facilitating the Spread of Knowledge and Innovation in Professional Software Development

Write for InfoQ

Topics

Choose your language

InfoQ Homepage DevOps Content on InfoQ

  • Hologram - Finally, AWS Key Distribution that Makes Sense

    Faced with the lack of solutions for secure distribution of AWS access keys to developers, AdRoll decided to build their own open source Hologram, a system that brings Amazon's Instance Profile mechanism to developer workstations. Adair details the process, tool design and main features.

  • Creating a Mobile Development Strategy for 2015

    Now that 2015 is underway, it’s imperative to consider a mobile strategy framework for a prosperous year and beyond. We will be discussing some key points to consider as you plan your strategy for the year, and how they can help you usher in a successful future. These topics include visual development environments , Bimodal IT, cloud-based mobile development and the HTML5 vs. native debate.

  • The Indian Banking Community Cloud

    In this article, authors discuss the Indian Banking Community Cloud (IBCC) that provides cloud-based services exclusively to Indian banks to address the financial sector's growing demand for secure cloud-based services.

  • Q&A with Gene Kim on the State of DevOps Survey

    The 4th edition of the State of DevOps survey is out. InfoQ talked to the survey's co-author Gene Kim to understand what are the goals for this edition, how the data is analysed and what have we learned so far from past surveys.

  • The Microservice Revolution: Containerized Applications, Data and All

    Microservice architectures and container-based virtualization have taken the software development community by storm in recent months. This article will describe the advantages of container-based microservices and why failing to containerize stateful services like databases greatly reduces the benefits of microservices architectures.

  • Beyond Blacklisting: Cyberdefense in the Era of Advanced Persistent Threats

    In this article, authors discuss the security vulnerabilities in software applications and how whitelisting approach has advantages over blacklisting. They also talk about how to implement the whitelisting security policies and cost involved with it.

  • How to Start With Security

    Computer security, or the lack thereof, has made many headlines recently. In this article we'll look at how bad things are and what you, as a software developer, can do about it. It will help get you started or hopefully give you some new ideas if you're already doing some security work.

  • Cloud Security Auditing: Challenges and Emerging Approaches

    Security audits are an important part of IT security programs. In this article, authors highlight the challenges in cloud computing business models, based on interviews with cloud security auditors. They talk about the challenges in the areas of transparency, encryption and colocation and domain-tailored audits as ideal solution in the new model.

  • Employing Enterprise Architecture for Applications Assurance

    In this article, authors discuss how enterprise, software, and security architects can improve software assurance by using the enterprise architecture to promulgate the software security controls. They also talk about other security model components like threat modeling, attack trees, secure design patterns, and misuse cases.

  • Config Management Camp Panel: Next Steps in Configuration Management

    Patrick Debois, part of the team that organized the first DevOps Days and who coined the term DevOps, ran the Config Management Camp panel "Next Steps in Configuration Management", featuring Luke Kanies, Puppet author and Puppet Labs CEO, John Keiser, development lead at Chef, Thomas Hatch, Salt author and Salt Stack founder, and Mark Phillips, director of business development at Ansible.

  • Service-Oriented Architecture and Legacy Systems

    In this article, authors provide an overview of current SOA technologies and how to evolve in legacy environments. They also discuss the topics of SOAP vs. REST web services, Enterprise Application Integration and incremental transition to SOA in legacy environments.

  • Simple TOSCA Orchestration for Docker

    TOSCA (Topology Orchestration Specification for Cloud Applications), governed by the OASIS organization, is a platform for defining a standard container orchestration specification that is portable across various cloud environments and container providers.

BT