Latest DevOps Articles

Latest DevOps Articles curated daily from around the web.


Matt and his three-developer team have been using Appian for the past seven years to replace and update more than 50 different legacy systems.
Ship your software like a Pro!!! Github recently announced Github package registry to publish and consume packages over GitHub. One stop solution for all open s...
Are you creating jobs in Jenkins for automating your Cloud infrastructure? Are you creating multiple jobs for the build, unit testing, regression testing, deplo...
Fathom Analytics | Fast, simple and privacy-focused website analytics. Fathom Analytics | Fast, simple and privacy-focused website analytics.
This weekend, I was in Stockholm in Sweden talking Query Store and plan forcing with Steinar Anderson, when he mentioned the problems he had while forcing plans...
Enterprises that move to the cloud enjoy clear benefits – namely redundancy, cost savings and easy integrations – but the challenges and security risks that com...
REST APIs are nice. Simple. Stateless. Scalable. But nowadays, your reactive web client's view (React / Vue.js / Angular) is expected to be updated in real time...
In a previous article, the LIXA project and the XTA programming model have been presented to show how two phase commit distributed transactions can be implement...
Achieve superior email deliverability with ToastMail! Our AI-driven tool warms up inboxes, monitors reputation, and ensures emails reach their intended destination. Sign up today for a spam-free future. Achieve superior email deliverability with ToastMail! Our AI-driven tool warms up inboxes, monitors reputation, and ensures emails reach their intended destination. Sign up today for a spam-free future.
While containers support backups, a better process treats SQL containers and database clones as code with a source controlled workflow. Full disclosure, I am a...
Blockchain is a relatively niche technology at the moment, and even thought there’s a lot of hype, its applicability is limited.
Users ask us for new features, bug fixes, and changes in domain logic for our applications every day. As any project (especially a monolith) grows, it often bec...
On Monday, The Financial Times reported that attackers have been exploiting a buffer overflow vulnerability in the popular messaging service WhatsApp. The vulne...
Achieve superior email deliverability with ToastMail! Our AI-driven tool warms up inboxes, monitors reputation, and ensures emails reach their intended destination. Sign up today for a spam-free future. Achieve superior email deliverability with ToastMail! Our AI-driven tool warms up inboxes, monitors reputation, and ensures emails reach their intended destination. Sign up today for a spam-free future.
The widespread use of autonomous vehicles could provide either a significant reduction in greenhouse gas emissions or it could see them rise significantly, with...
What Is Friendly? "Friendly" is a human, interpersonal quality. All other meanings are derivative. We perceive the actions of others that make us feel good as "...
It is so fast and easy that I will share how to write ssh-config file and to type a login command. Unless you change it, you won’t be able to login on ec2.
In a previous post, we introduced Apache Kafka, where we examined the rationale behind the pub-sub subscription model.