Puppet Labs has just released Puppet Enterprise 3.2, the commercially supported Puppet release. This release includes improvements such as fully supported modules, automation of tasks by non-root users and a tech preview of Razor, an application that discovers and provisions new servers.
In 2011 Trevor Eckhart found logs on his device that he believed were associated with Carrier iQ data. Our response at the time, which has since been confirmed by a detailed FTC investigation, is that the data collection logs were associated with and used by the manufacturer of the device, not Carrier iQ. They were not Carrier iQ logs.
It's one thing having an in-house training program. But there is a certain deeper insight that can be gained from attending a Q-Con conference in person. Which may be one reason why attendance at the globe-hopping event continues to grow.
Mitchell Hashimoto, creator of Vagrant, gave a talk last month at Velocity Conf London about his vision for a “FutureOps” with immutable infrastructures and built-in failure recovery.
VisionMobile has created an interactive map of more than 500 tools covering all aspects of enterprise software development: integration, development, testing, deployment, measuring, and marketing&monetization. The map provides a few descriptive paragraphs outlining the strengths of each tool, the idea being to offer developers a quick guide for choosing the right tool for the job.
On each day of the 3-day conference at the inviting environs offered at the Hyatt there was a jam-packed schedule of speakers, exhibits and activities that made for some difficult decisions as to which tracks and what happening to attend.
There is so much to learn about the latest Mobile Backend as a Service provider AnyPresence's 5.0 platform geared for the enterprise that this second post was needed. Co-founder Rich Mendis provides further insight for InfoQ readers…
Over the past months, InfoQ published three research items on the current state of Ruby on Rails practice. Now the results are in and we're taking a look at what tools Rails developers currently use.
Paul Biggar, co-founder of CircleCI, presented on "the many ways to deploy continuously" at RubyConf 2013 in April of this year. The frequency at which deployments happen qualifies the term "continuous" and directly influences the deployment problem space. The presentation aggregates solution information gathered from CircleCI's own customer base, Facebook, IMVU, Etsy, Heroku, and Google.
Clef is like a retina scan for your smart phone, which gives a whole new meaning to Retina Display. You can use Clef as an Open ID to log in from your smart phone only once to access many different web sites when online. Rather than typing in your user ID and password for each web site.
In the beginning of MBaaS, there was StackMob. Since then the mobile ecosystem has become flooded with competitors in this new approach to app dynamics. InfoQ takes a closer look at the Mobile Backend as a Service (MBaaS) provider StackMob and its privacy practices.
Netflix deploys a hundred times per day, without the use of Chef or Puppet, without a quality assurance department and without release engineers. To do this, Netflix built an advanced in-house PaaS (Platform as a Service) that allows each team to deploy their own part of the infrastructure whenever they want, however many times they require.
Part 2 of Infoq’s exclusive virtual interview with Anypresence cofounder Richard Mendis. The CMO weighs in on Facebook’s acquisition of competitor Parse and provides intel on the pricing structure of Anypresence.
CloudMunch launched its full-stack DevOps platform - a dashboard of pre-integrated tools for version control, build management, validation, automated testing, deployment and cloud connectors. The company claims its platform significantly simplifies deployment of applications and infrastructure.
Even if an app developer is a geek of the highest order, deftly orchestrating multiple code languages to fulfill their legal obligation for a comprehensive privacy protection policy, it all may be compromised when they permit their mobile app to funnel clients’ personal data, such as; texts, photos, geolocation, audio or video to an ad agency, MBaaS provider or other third party player.