Latest DevOps Articles

Latest DevOps Articles curated daily from around the web.


I’m pleased to announce that Microsoft is joining the Open Invention Network (“OIN”), a community dedicated to protecting Linux and other open source software p...
A discussion of the uses of multi-cloud strategies and infrastructures, as well as a look at some of its most common challenges and proposed solutions.
See how Snowflake, a data warehouse built for the cloud, maximizes query performance and reduces disk I/O and machine load for improved overall performance.
Perforce this week announced it plans to acquire Perfecto Mobile, a provider of automated application development tools, in a move that signals a Perforce plans...
LOS ANGELES, October 10, 2018 – Mission, a managed services and consulting company for cloud platforms including Amazon Web Services (AWS) and Microsoft
How do new recruits begin their journey at DevOpsGroup? Our latest blog looks at our two-week on-boarding process, to set our team up for life at DOG!
DevOps has quickly matured from a fairy tale to a bestseller at most large enterprises. However, we are still at the beginning of the DevOps story, with Several...
If you have been around software development much at all in the past five or 10 years, then you’ve certainly heard of DevOps and know it's here to stay. Today,...
We offer a discussion on data collected as part of our 2018 DZone Guide to DevOps, focusing in on DevOps processes, specifically, types of automated testing.
A tutorial demonstrating how developers can crop and resize an image in the cloud using Amazon's AWS working through a serverless architecture.
This brief article takes a look at a brief tutorial that explains working with SAPUI5 locally and adding more services in Docker. Explore the code on GitHub.
This article takes a look at a tutorial that explains the Windocks SQL Server container on Windows. Also explore configuring the SSRS container.
How can such risks be mitigated? Not through what has traditionally been called cybersecurity.
Engineering blog: An engineer's experience navigating the AWS authentication tarpit.
How do hackers find vulnerable systems? With today's indexed big data, they can just use a search engine. Help protect yourself by minimizing what gets indexed.