InfoWorld » DevOps Blog
206 FOLLOWERS
A blog by InfoWorld covering DevOps news, how-tos, features, reviews, and videos.
InfoWorld » DevOps Blog
22h ago
The key benefits of platform engineering are increased developer productivity, better quality of software, reduced lead time for deployment, and more stable applications, according to Puppet by Perforce’s 2024 State of Devops Report: The Evolution of Platform Engineering.
The report is based on a survey of 474 participants who work with a platform engineering team at their organizations. The survey was conducted in the summer of 2023.
Other benefits cited include cost savings, reduced time for product development, reduced errors, and reduced risk of security breaches. “Security has never just ..read more
InfoWorld » DevOps Blog
1w ago
The internet of things (IoT) has transformed the way we interact with the world, connecting a myriad of devices to the internet, from smart thermostats in our homes to industrial sensors in manufacturing plants. A significant portion of these IoT devices relies on the Linux operating system due to its flexibility, robustness, and open-source nature.
Deploying software to Linux-based devices, at scale, is a complex and critical process that requires planning, well-thought-out processes, and adherence to best practices to ensure the stability, security, and manageability of the IoT fleet. In thi ..read more
InfoWorld » DevOps Blog
1w ago
JetBrains has launched a public beta version of TeamCity Pipelines, a cloud-based CI/CD (continuous integration/continuous delivery) service for small and medium-sized software engineering teams.
Unveiled March 18, TeamCity Pipelines is intended to enable small development teams to automate the process of integrating code changes, testing them, and delivering an application. JetBrains said the goal was to provide an intuitive platform for running devops pipelines with minimum complexity. The combination of a user-friendly UX with intelligence and optimization features for small teams minimize ..read more
InfoWorld » DevOps Blog
1w ago
Frank Crane wasn’t talking about open source when he famously said, “You may be deceived if you trust too much, but you will live in torment if you don’t trust enough.”
But that’s a great way to summarize today’s gap between how open source is actually being consumed, versus the zero trust patterns that enterprises are trying to codify into their DevSecOps practices.
Every study I see suggests that between 90% and 98% of the world’s software is open source. We’re all taking code written by other people—standing on the shoulders of giants—and building and modifying all that code, impl ..read more
InfoWorld » DevOps Blog
2w ago
JetBrains has released fixes for two critical security vulnerabilities in its TeamCity On-Premises CI/CD system discovered by cybersecurity company Rapid7.
The two vulnerabilities reported in late-February by Rapid7 would enable an authenticated attacker with HTTP(S) access to a TeamCity On-Premises server to bypass authentication checks and gain administrative control. These vulnerabilities affected all TeamCity On-Premises versions through 2023.11.3, but have been fixed in TeamCity On-Premises 2023.11.4. For users unable to update their server to version 2023.11.4, JetBrains also released a ..read more
InfoWorld » DevOps Blog
1M ago
Enterprise developer software firm Perforce will buy data management provider Delphix for an undisclosed sum, the companies said on Wednesday.
The type of data management tools that Delphix offers — most notably virtualization and masking technology that allows for devops testing without misusing personally identifiable information or sensitive corporate data — makes it easier for devops teams to enhance their application delivery pipelines.
“In addition to data automation and compliance, we are also excited to provide our customers with the operational efficiencies and reduced costs afforded ..read more
InfoWorld » DevOps Blog
1M ago
One of the great advantages of using the public cloud is the ability to deploy applications and services at scale. But scale has a flip side, as working with dozens or hundreds of servers imposes new constraints on systems administration. Where we could manage one or two devices using a CLI or a GUI, or 10 or 20 devices using our own scripts, managing a massive fleet of devices requires a very different approach. We need infrastructure as code and automation.
This approach is the basis for Microsoft’s Azure Automation, a collection of tools for managing virtual infrastructures using a mix of d ..read more
InfoWorld » DevOps Blog
1M ago
One of the great advantages of using the public cloud is the ability to deploy applications and services at scale. But scale has a flip side, as working with dozens or hundreds of servers imposes new constraints on systems administration. Where we could manage one or two devices using a CLI or a GUI, or 10 or 20 devices using our own scripts, managing a massive fleet of devices requires a very different approach. We need infrastructure as code and automation.
This approach is the basis for Microsoft’s Azure Automation, a collection of tools for managing virtual infrastructures using a mix of d ..read more
InfoWorld » DevOps Blog
1M ago
The article, Machine learning for Java developers: Algorithms for machine learning, introduced setting up a machine learning algorithm and developing a prediction function in Java. Readers learned the inner workings of a machine learning algorithm and walked through the process of developing and training a model. This article picks up where that one left off. You'll get a quick introduction to Weka, a machine learning framework for Java. Then, you'll see how to set up a machine learning data pipeline, with a step-by-step process for taking your machine learning model from development into prod ..read more
InfoWorld » DevOps Blog
2M ago
Last year’s MOVEit and 3CX vulnerabilities offered a stark reminder of the risk software supply chain attacks pose today.
Threat actors exploit vulnerabilities to infiltrate a software provider’s network and modify the software’s original functionality with malicious code. Once the infected software is passed on to customers, typically through software updates or application installers, the breach opens the door to unauthorized tasks, such as exfiltrating sensitive information or hijacking data.
To read this article in full, please click here ..read more