Acquisition Archetypes Seen in the Wild, DevSecOps Edition: Cross-Program Dependencies
SEI Blog » DevSecOps
by William Novak
5M ago
Shared capabilities can help manage costs and complexities but can also result in cross-program dependencies. This post examines this phenomenon in a DevSecOps context ..read more
Visit website
Cultivating Kubernetes on the Edge
SEI Blog » DevSecOps
by Patrick Earl, Jeffrey Hamed, Jose Morales, Doug Reynolds
7M ago
Members of the SEI DevSecOps Innovation team were asked to explore an alternative to VMware’s vSphere Hypervisor in an edge compute environment. This post explores their prototype ..read more
Visit website
Polar: Improving DevSecOps Observability
SEI Blog » DevSecOps
by Morgan Farrah
9M ago
This post introduces Polar, a DevSecOps framework developed as a solution to the limitations of traditional batch data processing ..read more
Visit website
Example Case: Using DevSecOps to Redefine Minimum Viable Product
SEI Blog » DevSecOps
by Joe Yankel
11M ago
This SEI blog post, authored by SEI interns, describes their work on a microservices-based software application, an accompanying DevSecOps pipeline, and an expansion of the concept of minimum viable product to minimum viable process ..read more
Visit website
Acquisition Archetypes Seen in the Wild, DevSecOps Edition: Clinging to the Old Ways
SEI Blog » DevSecOps
by William Novak
11M ago
This SEI blog post draws on SEI experiences conducting independent technical assessments to examine problems common to disparate acquisition programs. It also provides recommendations for recovering from these problems and preventing them from recurring ..read more
Visit website
Extending Agile and DevSecOps to Improve Efforts Tangential to Software Product Development
SEI Blog » DevSecOps
by David Sweeney, Lyndsi Hughes
11M ago
The modern software engineering practices of Agile and DevSecOps have revolutionized the practice of software engineering. This blog post explores use of these practices in capability delivery and business mission ..read more
Visit website
5 Challenges to Implementing DevSecOps and How to Overcome Them
SEI Blog » DevSecOps
by Joe Yankel, Hasan Yasar
11M ago
The shift from project- to program-level thinking raises numerous challenges to DevSecOps implementation. This SEI Blog post articulates these challenges and ways to overcome them ..read more
Visit website
Actionable Data from the DevSecOps Pipeline
SEI Blog » DevSecOps
by Bill Nichols, Julie Cohen
11M ago
In this blog post, we explore decisions that program managers make and information they need to confidently make decisions with data from DevSecOps pipelines ..read more
Visit website
Writing Ansible Roles with Confidence
SEI Blog » DevSecOps
by Matthew Heckathorn
11M ago
How do you write Ansible roles in a way where you can be confident your role works as intended? This post provides guidance on how to best begin developing Ansible roles ..read more
Visit website
A Technical DevSecOps Adoption Framework
SEI Blog » DevSecOps
by Vanessa Jackson, Lyndsi Hughes
11M ago
This blog post describes our new DevSecOps adoption framework that guides the planning and implementation of a roadmap to functional CI/CD pipeline capabilities ..read more
Visit website

Follow SEI Blog » DevSecOps on FeedSpot

Continue with Google
Continue with Apple
OR