InfoQ Homepage DevOps Content on InfoQ
-
Beyond POSIX - Adventures in Alternative Networking APIs
Michael Barker surveys some of the alternative APIs available on various platforms, discussing some of the implementation pitfalls. He also looks at the impact of using these APIs.
-
Application-Layer Encryption Basics for Developers
Isaac Potoczny-Jones covers the basics of encryption, what are application-layer and infrastructure-layer encryption, when to use asymmetric and symmetric keys, and how to do key management.
-
Cloud DevSecOps in Practice: People, Processes and Tools
The panelists discuss how to get the right security, DevOps, and cloud engineering stakeholders together to build a realistic DevSecOps strategy.
-
Maintaining Software Quality with Microservices
The panelists discuss what microservices are, why companies are making the transition, how to identify the challenges when planning the move to microservices, and best practices for software quality.
-
Pivoting and Exploitation in a Docker Environment
Filipi Pires discusses different ways that exist in working with a single form of pivot and how to overcome different obstacles in different networks within this “new” environment called Docker.
-
Depending on Whether I Had Coffee or Not, Your Application May Be High Risk
Shannon Morrison and Scott Behrens discuss how to perform application risk analysis at scale.
-
Making Applications Resilient with a Smart Application Aware Network
Varun Talwar goes through three patterns that can be used to make an application highly available by transparently injecting application aware network components which can improve resiliency.
-
Container Security and Observability in Kubernetes Environments
The panelists discuss how to take care of the security and monitoring of Kubernetes.
-
Securing the Development & Supply Chain of Open Source Software (OSS)
David Wheeler discusses how OSS is developed & distributed as a supply chain (SC) model, how OSS developers can develop & distribute secure OSS today, and how potential users can select secure OSS.
-
Cloud Native Continuous Delivery on Kubernetes with Tekton
Jerop Kipruto introduces the building blocks of Tekton and shows how they fit with Kubernetes. Then she demonstrates how Tekton works and how to use it in an end-to-end continuous delivery process.
-
Resilience in Supply Chain Security
Dan Lorenc goes over real-world threats facing open source supply-chains today, and what can be done to architect resilient build and delivery pipelines.
-
Panel: Observability and Understandability
Jason Yee, John Egan, and Ben Sigelman discuss their approaches and preferred methods to get impactful results in incident management, distributed tracing, and chaos engineering.