Curated articles, resources, tips and trends from the DevOps World.
Back in the mid-1990’s, I had a young family and 5 or 6 PCs in the basement. One day my son Stephen and I bought a single box that contained a bunch of 3COM network cards, a hub, some drivers, and some cables, and spent a pleasant weekend setting up our first home LAN.
We will go over a Python AWS Boto3 Security Groups Guide. Did you know that Boto3 allows you to programmatically change the security groups?
Having a plan to back up your data is one of the most important processes to protect the data in the event of a cyber attack. Should a malware or ransomware attack occur, you can boot a saved backup and restore your data to its previous state.
Ambassador Labs sponsored this post. As discussion about developer control planes and centralized developer platforms reach a crescendo in the crowded cloud native space, it’s safe to say that platforms for Kubernetes developers can drive everything from curiosity to productivity.
Here an attack, there an attack, everywhere an attack. Just tracking security issues today is misery. Making matters worse, there’s little rhyme or reason to coordinating attack data.
It gives me immense pleasure to present this blog as I intern with Docker as a Product Marketer. This incredible experience has given me the chance to brainstorm many new ideas.
Brain.js is a JavaScript library for deploying a neural network in the browser or on Node.js. It uses a computer’s GPU (graphics processing unit) for calculations, or pure JavaScript when GPU isn’t available. The lead developer of Brain.
Lightrun sponsored this post. This is the last of a three-part series on shift left observability. Read Part 1 and Part 2.
AWS Ambassadors Colin Barker and Greg Heywood have teamed up to create a series of podcasts offering an expert perspective on the Well-Architected Framework. This first podcast introduces the Well-Architected concept and underlines the value of continual improvement in the cloud.
A web application firewall is a network security solution for commercial use that protects servers from potential cyber attacks that can exploit a web application’s vulnerabilities.
Have valuable insights to share with the DevOps community? Submit your article for publication.
Get the latest DevOps news, tools, and insights delivered to your inbox.
Made with pure grit © 2025 Jetpack Labs Inc. All rights reserved. www.jetpacklabs.com