InfoQ Homepage DevOps Content on InfoQ
-
Iterating on Models on Operating ML
Monte Zweben and Roland Meertens discuss the challenges in building, maintaining, and operating machine learning models.
-
One Ring -3 to Secure Them All: Computing with Hardware Enclaves
Aaron Bedra explores the most widely available options and their usage in IoT and cloud, discussing design trade-offs, security, and performance.
-
Beyond POSIX - Adventures in Alternative Networking APIs
Michael Barker surveys some of the alternative APIs available on various platforms, discussing some of the implementation pitfalls. He also looks at the impact of using these APIs.
-
Application-Layer Encryption Basics for Developers
Isaac Potoczny-Jones covers the basics of encryption, what are application-layer and infrastructure-layer encryption, when to use asymmetric and symmetric keys, and how to do key management.
-
Cloud DevSecOps in Practice: People, Processes and Tools
The panelists discuss how to get the right security, DevOps, and cloud engineering stakeholders together to build a realistic DevSecOps strategy.
-
Maintaining Software Quality with Microservices
The panelists discuss what microservices are, why companies are making the transition, how to identify the challenges when planning the move to microservices, and best practices for software quality.
-
Pivoting and Exploitation in a Docker Environment
Filipi Pires discusses different ways that exist in working with a single form of pivot and how to overcome different obstacles in different networks within this “new” environment called Docker.
-
Depending on Whether I Had Coffee or Not, Your Application May Be High Risk
Shannon Morrison and Scott Behrens discuss how to perform application risk analysis at scale.
-
Making Applications Resilient with a Smart Application Aware Network
Varun Talwar goes through three patterns that can be used to make an application highly available by transparently injecting application aware network components which can improve resiliency.
-
Container Security and Observability in Kubernetes Environments
The panelists discuss how to take care of the security and monitoring of Kubernetes.
-
Securing the Development & Supply Chain of Open Source Software (OSS)
David Wheeler discusses how OSS is developed & distributed as a supply chain (SC) model, how OSS developers can develop & distribute secure OSS today, and how potential users can select secure OSS.
-
Cloud Native Continuous Delivery on Kubernetes with Tekton
Jerop Kipruto introduces the building blocks of Tekton and shows how they fit with Kubernetes. Then she demonstrates how Tekton works and how to use it in an end-to-end continuous delivery process.