InfoQ Homepage DevOps Content on InfoQ
-
Orchestrating Your Delivery Pipelines with Jenkins
Following up on his previous article on preparing for CD in the enterprise, Andrew Phillips reviews state-of-the-art plugins and solutions in the Jenkins ecosystem for achieving efficient, reproducible and secure delivery pipelines. Helped by none other than Jenkins creator, Kohsuke Kawaguchi.
-
How to Protect Valuable or Personal Data on PC, Hard Drive and Flash Drive
Approximately 60% of all computers sold worldwide today are portable. Portable computers are taken everywhere, making them an easy target for criminals, especially for the private data they contain. Even a failed hard drive that you send back to your vendor for warranty is a potentially at risk. How can your personal data be protected? With one word - encryption!
-
Virtual Panel on Immutable Infrastructure
“Immutable Infrastructure” is a term that has been increasingly talked about lately among the Ops community. InfoQ reached out to experienced ops engineers to ask them what is the definition and borders of immutable infrastructure as well as its benefits and drawbacks, in particular when compared to current widespread “desired state” configuration management solutions.
-
Embedded Analytics and Statistics for Big Data
This article provides an overview of tools and libraries available for embedded data analytics and statistics, both stand-alone software packages and programming languages with statistical capabilities. The authors also discuss how to combine and integrate these embedded analytics technologies to handle big data.
-
Reliable Auto-Scaling using Feedback Control
Philipp K. Janert explains how to reliably auto-scale systems using a reactive approach based on feedback control which provides a more accurate solution than deterministic or rule-based ones.
-
Book Review: Test-Driven Infrastructure with Chef - Second Edition
The second edition of Stephen Nelson-Smith's book "Test-Driven Infrastructure with Chef" covers the principles behind "Infrastructure as Code", provides an introduction to Ruby, Chef, and important Tools. The main part consists of detailed examples on how to use the tools required to write fully tested infrastructure code.
-
Answering Common Cloud Security Questions from CIOs
With the news stories of possible data breaches at enterprises like Target, and the current trend of companies migrating to cloud environments for the flexibility, scalability, agility, and cost-effectiveness they offer, CIOs have been asking hard questions about cloud security.
-
Big Data Analytics for Security
In this article, authors discuss the role of big data and Hadoop in security analytics space and how to use MapReduce to efficiently process data for security analysis for use cases like Security Information and Event Management (SIEM) and Fraud Detection.
-
The Secrets of Database Change Deployment Automation
Yaniv Yehuda looks at the challenges involved in automating database deployments and offer suggestions based on Agile and DevOps concepts.
-
Virtual Roundtable: The Future of PaaS in Cloud Computing
There has been a raging debate about PaaS and whether it is still a valuable part of a cloud portfolio, so InfoQ reached out to four leaders in the cloud domain (cloud advocate Krish Subramanian, cloud developer Dan Turkenkopf, cloud executive JP Morgenthal, and cloud expert James Urquhart) for their opinions on the future of PaaS.
-
Interview with Raffi Krikorian on Twitter's Infrastructure
Raffi Krikorian, Vice President of Platform Engineering at Twitter, gives an insight on how Twitter prepares for unexpected traffic peaks and how system architecture is designed to support failure.
-
Beyond Piracy: Software Publishers Battle Greater Threats to Their Intellectual Property
Software is in everything from our automobiles to our mobile devices, and as the world becomes even further immersed in the digital era, new security threats are arising beyond the software industry. Today, software products are becoming more susceptible to incidences of reverse-engineering and code tampering – not just outright theft.