Latest DevOps Articles

Latest DevOps Articles curated daily from around the web.


Subbiah Sundaram Subbiah Sundaram spearheads product management at HYCU. He has been instrumental in enabling the company to deliver HYCU Protégé along with the...
The NSA, yes, the National Security Agency, has two jobs. One you know about from my spy movies and the like is to eavesdrop on communications outside the Unite...
In my previous column about NFTs (non-fungible tokens), I discussed the current leading standard for this technology: ERC-721. That’s the one most digital colle...
Fathom Analytics | Fast, simple and privacy-focused website analytics. Fathom Analytics | Fast, simple and privacy-focused website analytics.
HTML over-the-wire has been picking up steam as a more straightforward way to create web applications, without needing to use as much JavaScript. It works by se...
This post is part of our Week in Review series. Check back each week for a quick round up of interesting news and announcements from AWS! Another week, another...
Junta Nakai Junta Nakai is the VP, Global Head of Financial Services and Sustainability at Databricks.
Every company under the sun relies on automation to make business hum. Getting leverage out of technology is the reason the world’s biggest companies can operat...
Fathom Analytics | Fast, simple and privacy-focused website analytics. Fathom Analytics | Fast, simple and privacy-focused website analytics.
In Neal Stephenson’s 1999 essay “In the Beginning Was The Command Line”, he describes how using Command-Line Interface (CLI) utilities is simpler and requires l...
Cloud security is top of mind right now, given the various high-profile security breaches today. One overlooked source of potential vulnerabilities is unused EC...
This article explains, step-by-step (with screenshots) how to use a Relay workflow to delete unused Azure network interfaces.
DataStax sponsored this post. Migrating a legacy SQL-based application to NoSQL can pose a real challenge; it might feel like a sliding puzzle, requiring a clea...
Shirts painstakingly handcrafted by under-caffeinated developers. Shirts painstakingly handcrafted by under-caffeinated developers.
When thinking about cost management and optimization in Kubernetes ownership, configuration is critical.

blog.ivankahl.com

Extension Methods in C#
Have you ever needed to extend a class provided by a third-party library? Perhaps you want to add additional functionality or simplify a particular set of metho...
Ondat sponsored this post. Outages and degraded performance are inevitable. Operators make mistakes; new protocols introduce errors, natural disasters damage eq...
With increased adoption of container automation, IT organizations continue to expand their requirements when it comes to deploying and managing their Kubernetes...