Curated articles, resources, tips and trends from the DevOps World.
Every quarter, we ask one of our expert Training Architects to create a free challenge for our community to take on. These aren’t just any old challenges.
Intel is bolstering its neuromorphic computing ambitions with the second iteration of its Loihi processor and an open framework that the company hopes will accelerate the development of software for the emerging space. The second-generation Loihi 2 processor, introduced Sept.
The Linux Foundation sponsored this post. For as long as there’s been an internet, there have been security threats. Fortunately the good guys have been able to come up with ways to meet the growing number of hazards. But this has come with a performance price.
When I first set out to tackle the topic of whether startups should take venture capital support or go it alone, I ran into an initial problem: I couldn’t think of any company in the open source and cloud native ecosystem that had been bootstrapped.
A proxy server is an intermediary server that retrieves data from an Internet source, such as a webpage, on behalf of a user. Proxy servers have many different uses, depending on their configuration and type.
Thundra sponsored this post. Oguzhan Ozdemir Oguzhan is a solutions engineer at Thundra. LocalStack has an amazing community, and everybody loves the product.
Cribl sponsored this post. Enterprises are facing an unprecedented wave of operational and security observability data. The data is complex, multidimensional and high velocity.
The August 31st announcement of updating our product subscriptions has enabled us to make serious investments into building what you want. So we’re here to say: let us know what that is! On September 13th Scott Johnston announced that we are moving forward with Docker Desktop for Linux.
The inaugural HashiCorp State of Cloud Strategy Survey collected responses from more than 3,200 IT practitioners, technical decision makers, and business decision makers in HashiCorp’s opt-in database.
The Forge team at Puppet has been hard at work for the past few months building out a malware scanning framework in order to help folks be more proactive about their security posture. Now, to be clear, this doesn't replace your own security mitigations. You should still audit untrusted code.
Have valuable insights to share with the DevOps community? Submit your article for publication.
Get the latest DevOps news, tools, and insights delivered to your inbox.
Made with pure grit © 2025 Jetpack Labs Inc. All rights reserved. www.jetpacklabs.com