"Site Reliability Engineering - How Google Runs Production Systems" is an open window into Google's experience and expertise on running some of the largest IT systems in the world. The book describes the principles that underpin the Site Reliability Engineering discipline. It also details the key practices that allow Google to grow at breakneck speed without sacrificing performance or reliability.
Our efforts to improve software development face the question of what to focus on. Should we govern for predictability without concern of value, maximizing cost-efficiency without concern for end-to-end responsiveness? Or maybe do the opposite and govern for value over predictability, focus on responsiveness over cost efficiency? What we really need is to be predictably adaptable.
This article describes two novel practices for continuous delivery: Latent-to-live code pattern and Forward compatible interim versions. You can use these practices to simultaneously increase speed and reliability of software development and reduce risks. These practices are built on top of two other essential continuous delivery practices: trunk-based-development and feature toggles.
There is a lot of information about DevOp out there but little on tackling DevOps in financial organisations. This article presents lessons learnt rolling out DevOps in a large insurance organization.
In this week's podcast, professor Barry Burd talks to Shuman Ghosemajumder VP of product management at Shape Security on Security and Cyber-Crime at QCon New York 2016.
This is the second article of a two article series in which we try to work from an abstract level of IoT reference architectures towards a concrete architecture for actual use cases. 1
This article series explains how containers are actually being used within the enterprise.
Agile, with cross functional teams, has sounded the death knell for many test managers. While test management is largely irrelevant in agile, there is still a desperate need for test leadership.
InfoQ recently sat down with Adrian Mouat, author of “Using Docker”, and explored how containers can be best utilised within a typical software development lifecycle.
Xu Wang introduces HyperContainer, a runtime for running Docker images on any hypervisor, providing hardware-enforced isolation for multi-tenant environments.
Security has evolved to be pretty good at granting and managing access to confidential information - by people. But automation is taking over, requiring a shift in how we secure our infrastructure. 1
Sourcing Security Superheroes: Part II: How Policy Can Enhance, Rather Than Hinder, Breach Detection
In theory, security policies protect organizations, stakeholders, and users. But in practice, organizations become more concerned with meeting these standards than protecting the business.