Businesses use load testing to determine the maximum workload their software operations can handle and how their platform holds up during increased usage. Load testing analyzes the performance, reliability, and capacity of a software implementation on specific hardware, as well as gives companies the ability to identify problems that may arise. Here are several questions businesses should consider as they prepare to conduct a load test ...
Vendor Forum
In the face of emerging and increasingly frequent cyber threats, DevOps is evolving into DevSecOps, where security is the responsibility of every individual and engrained throughout the development process. While the concept is sound, making it a reality is going to take work ...
Using DevOps principles when dealing with incidents and outages can help organizations avoid common pitfalls many companies encounter when a disruption in service inevitably occurs. Here are five DevOps practices that can keep a crisis from getting worse ...
Someone recently asked me this question: "What's the first thing that comes to your mind when you hear the word 'DevOps'?" The first thing I think about when I hear the word DevOps is Brent from The Phoenix Project ...
Key findings of a new study by Automic indicate steady growth of the tool stack, how unstable and unrealistic vendor lock-in has become and the importance of managing a coherent deployment pipeline, especially as many organizations begin to adopt and implement DevOps focused initiatives ...
It shouldn’t come as a surprise that software quality is a top concern for organizations of all shapes and sizes. But heavy workloads, time constraints and lack of manpower plague many organizations. Despite the obstacles, however, with the right tools and best practices, teams can successfully and consistently peer review all code – leading to higher quality software in less time and at a reduced cost ...
Privilege Management is a new age term, born from the crucible of Role Based Access Control (RBAC). Privilege Management refers to the ability of any enterprise to successfully manage, detect and mitigate any possibility of employee account misuse. The definition is quite terse and a bit wishful. In reality most organizations have very poor privilege management practices employed for their resources. In this blog, I will discuss why that is the case, what are some good strategies to launch effective privilege management in your organization and some of the gotchas that you can avoid ...
DevOps is permeating the enterprise as both a technical and professional movement. If able to adequately manage a career in DevOps, it can be highly rewarding and fulfilling to have a profound impact on how your business operates and how your teams work together. So how do you get on the path to success with a career in DevOps? ...
The implementation of DevOps can take on many forms but it is most often recognized through implementation of continuous delivery practices. When implementing continuous delivery the activities of build, test, and deploy are automated such that it ensures that your software is always in a release ready state. Successfully adopting DevOps through Continuous Delivery provides many business and technical advantages including ...
Where is the current state of DevOps adoption, and what are the resulting challenges and conditions, among the global masses? Beyond the unicorns and thought leaders – and certainly outside the realm of vendor marketing – how far has this journey progressed among you, the average DevOps-affected professionals? How can you find out where your organization really stands, or what questions you need to consider in further advancing, or even merely beginning the DevOps transformation? Here's one alternative – take the 2016 State of DevOps Survey ...
The use of APIs to enable applications to interact across single and multiple infrastructures is skyrocketing and innovation is being fueled by companies finding new ways to monetize their software assets by exposing APIs to outside developers. However, exposing APIs to developers outside the company creates significant risk and APIs are becoming a growing target for cyber criminals. A new study by Ovum highlights an alarming lack of consistency and ownership in how API security is addressed ...
Sandboxes (aka Uber Containers) are self contained infrastructure environments that can be configured to look exactly like the final target deployment environment, but can be created and run anywhere. Sandboxes address the real question of "where" do I develop my application so that the environment and infrastructure that it runs on look the same from the development lab to the test lab to the production datacenter or cloud ...
Business as usual thinking flows to IT, where any experimentation and innovative thinking is asphyxiated. In this environment, technologies like cloud computing are dismissed as being "too risky" or "not applicable here". As for DevOps? Well, that's just for Unicorns and will never work in an enterprise ...