Latest DevOps Articles

Latest DevOps Articles curated daily from around the web.


In this article, you will find practical tips on best practices to maintain a proper work from home setup for your software developers. The Novel Coronavirus (C...
A description of the fusion of 5G, IoT, and AI. First, let's explain these three terms briefly, including the applications and use cases of each. The amount of...
The process of building a simple CI/CD pipeline for existing .net core application to moving it to Azure Kubernetes Services using Azure DevOps. Building CI/CD...
Digital Ocean Providing developers and businesses a reliable, easy-to-use cloud computing platform of virtual servers (Droplets), object storage ( Spaces), and more.
This article discusses about an anti-pattern called mini-monolith, Mini monolith is not a pragmatic microservice but it is small monolith. ‘Microservices’ is a...
Teamwork Company News Company News
Teamwork Teamwork Teamwork
On the eve of the first virtual Appian World, we caught up with Appian founder and CTO Michael Beckley. Michael spoke to us about low-code and RPA as well as AI...
Shirts painstakingly handcrafted by under-caffeinated developers. Shirts painstakingly handcrafted by under-caffeinated developers.

www.upguard.com

What is DNS Spoofing?
DNS spoofing, or DNS cache poisoning, is a cyber attack where false Domain Name System (DNS) information is introduced into a DNS resolver's cache.
But come 2020, I wanted to have a 360-degree view on the technology landscape that is shaping our present and future. This I wanted to do to shape up my career...
Alan Shimel: Hey, everyone, this is Alan Shimel, and you’re listening to DevOps Chats. Today’s DevOps Chats features Elad Koren, who is VP of product at Perimet...
One of the primary goals of the Go programming language is to make concurrency simpler, faster, and more efficient. With Rust growing in popularity let’s see ho...
Fathom Analytics | Fast, simple and privacy-focused website analytics. Fathom Analytics | Fast, simple and privacy-focused website analytics.
In this article, we discuss how to easily configure an SSL/TLS connection in Java to better secure your application.
At the end of 2019, we launched a preview version of Amazon Kendra, a highly accurate and easy to use enterprise search service powered by machine learning. Tod...
In this article, we discuss how to implement two-factor authentication for a REST API with Spring Webflux. Multi-factor authentication became common practice fo...
Understanding of how we deal with our own limitations informs the way we respond to change.