Curated articles, resources, tips and trends from the DevOps World.
Kubernetes is hard — to paraphrase the words of what one of Kubernetes’ main creators Joe Beda wrote a few years ago in one of his seminal essays on Kubernetes. Flash forward a few years later, and Kubernetes is still painstakingly difficult for most organizations to manage.
Whalecome, dear reader, to our second installment of Dear Moby. In this developer-centric advice column, our Docker subject matter experts (SMEs) answer real questions from you — the Docker community. Think Dear Abby, but better, because it’s just for developers!
Since connectivity is critical to all types of business applications including cloud apps, managing and maintaining the network often falls into the overnight hours. This is great for the business, but it puts a large wrinkle in your work-life balance.
The question, “Is a Rust rewrite really worth it?” is not just a tongue twister, it’s a dilemma keeping engineers awake at night.
Schemas are an essential part of any data platform. They’re metadata that define the shape of the data and the properties’ names and data types. Schemas are helpful in two ways.
In cybersecurity, triage is a cyber incident response approach to identifying, prioritizing, and resolving cybersecurity attacks, threats, and damages within a network.
It’s not just that much of the modern world of computers grew out of work done in the 1970s at Xerox PARC center. Yes, in a very real sense it inspired the form of our hardware, our user interfaces, and even our programming methodologies.
Development projects can get very busy. They can also grow to massive proportions. When projects do expand (especially those of an open-source nature), they take on more and more developers. That’s great… until it’s not.
AWS CloudFormation custom resource provides mechanisms to provision AWS resources that don’t have built-in support from CloudFormation. It lets us write custom provisioning logic for resources that aren’t supported as resource types under CloudFormation.
The education sector, particularly higher education, has experienced more cyber attacks than any other industry in recent years, according to a report by Check Point Research. This trend of targeted attacks has led to massive data breaches and loss of sensitive information.
Have valuable insights to share with the DevOps community? Submit your article for publication.
Get the latest DevOps news, tools, and insights delivered to your inbox.
Made with pure grit © 2025 Jetpack Labs Inc. All rights reserved. www.jetpacklabs.com