Latest DevOps Articles

Latest DevOps Articles curated daily from around the web.


My Kubernetes notes… “What is Kubernetes?” is published by Ferhat Aykan
Have you ever wondered what is inside a Docker image? Fortunately, it is not a black box. We can unpack every Docker image and check what is inside.
Learn how to use a Jenkins pipeline to build and publish over SSH, the benefits of this method, and how to download and set up the SSH plugin for Jenkins.
Fathom Analytics | Fast, simple and privacy-focused website analytics. Fathom Analytics | Fast, simple and privacy-focused website analytics.
Learn how microservices make development easier by simplifying deployment and testing, and enabling you to write code in any language for your project.
Time has changed. Now we have a DevOps Architect. No, don’t think for a replacement. In fact, we need both. We are talking about the web world. We are trying to...

devops.com

Status Codes
Any DevOps professional worth their salt inherently understands how inextricably tied the future of work is with coding, scripts and automation. It’s We’ve sift...
Fathom Analytics | Fast, simple and privacy-focused website analytics. Fathom Analytics | Fast, simple and privacy-focused website analytics.
In this new, process-driven environment, ad hoc, hand-built, point-to-point integration has given way to a strategic approach.
AWS will make available instances of its IT infrastructure available in on-premises IT environments, which it will then manage on behalf of customers.
In countries around the world, natural disasters have been much in the news. If you had a hunch such calamities were increasing, you’re right. In 2017, hurrican...
Premium Blob Storage, which is currently in limited public preview, unlocks a new level of performance in public cloud object storage. It uses a combination of...
Shirts painstakingly handcrafted by under-caffeinated developers. Shirts painstakingly handcrafted by under-caffeinated developers.
This post takes a look at recent breach at USPS and their inability to incooporate functional testing for APIs, leading to vulnerabilities.
This post looks at the most famous cybersecurity debacles over the years, ranging from breaches in government offices, baby monitors, dating apps, and more.
For startups, some type of projects come once in a while, especially a foray into areas you are not familiar with. An opportunity came for me to pitch a portal...
Kubernetes deployment tutorial guide will explain the key concepts in a kubernetes YAML specification with an nginx example deployment.