DevOps
Resources

FILTER BY

A Comprehensive Guide to Cloud Native Technologies

A Comprehensive Guide to Cloud Native Technologies

Cloud native technologies come in a variety of shapes and sizes. They all share certain key traits, such as the use of loosely coupled architectures and the ability to run in distributed environments. Beyond that, however, cloud native technologies work in different ways and solve different challenges. For that reason, mastering cloud native computing requires…
How to Choose a Docker Base Image for Python

How to Choose a Docker Base Image for Python

When it comes to containerized applications, choosing the right container base image – meaning the foundational image on which you build new, customized container images – is half the battle for success. The base image you choose plays a central role in your application’s security, performance, maintainability and more. To illustrate the point, this article…
Why Use Ubuntu as a Docker Base Image When Alpine Exists?

Why Use Ubuntu as a Docker Base Image When Alpine Exists?

When you’re choosing a base image for building a new container, your instinct might be to select the leanest base image possible. After all, base images that are smaller result in faster build operations. They also are more secure, in the sense that they have a smaller attack surface. That doesn’t mean, however, that smaller…
6 Cloud Native Application Design Principles

6 Cloud Native Application Design Principles

What does it mean to be cloud native? One of the best ways to answer that question is to think in terms of how cloud native applications are designed. To a certain degree, this is an ambiguous topic. There is no specific type of application design pattern, coding language or hosting infrastructure that you have…
How to Improve Software Distribution with a CDN

How to Improve Software Distribution with a CDN

When it comes to distributing software over a network, every millisecond may count. In other words, your ability to deliver apps or other software artifacts within fractions of a second can be critical for achieving your software delivery goals. Unfortunately, sub-second software distribution isn’t always feasible when you’re moving software over the Internet. In some…
Why and How to Perform Open Source Security Scans?

Why and How to Perform Open Source Security Scans?

Open source software is great in many ways. It’s usually free of cost, it’s easy to modify or extend and borrowing open source code can reduce the time it takes to develop an app. On the other hand, a major challenge of using open source software is security. While open source is no more (or…
Guide to Vulnerability Scanning Using Software Composition Analysis

Guide to Vulnerability Scanning Using Software Composition Analysis

Every software application can contain vulnerabilities. As a matter of fact, according to a 2021 report, no less than 100 percent of applications tested by security researchers included vulnerabilities, and 85 percent of them were considered critical. Fortunately, using Software Composition Analysis (SCA) tools, it’s possible to detect most vulnerabilities before you deploy software into production.…
Best Practices for Securing the Software Development Lifecycle

Best Practices for Securing the Software Development Lifecycle

In a perfect world, security risks would arise at only one point in the software development lifecycle, and engineers could address them through a single set of tools and practices. But that, unfortunately, is not the world we live in. Instead, the software development lifecycle – which means the set of processes that teams perform…
7 Misconceptions about Cloud Native Development

7 Misconceptions about Cloud Native Development

What is cloud native development? Those who think that it’s simply a development process hosted in the cloud or a development operation for apps that run in the cloud, may not quite understand what cloud native development really means. Indeed, it’s easy to have a number of misconceptions about how cloud native development works. Below,…
3 Essential Steps to Securing Your Docker Container Deployments

3 Essential Steps to Securing Your Docker Container Deployments

Docker containers provide a more secure environment for your workloads than traditional server and virtual machine (VM) models. They offer a way to break up your applications into much smaller, loosely coupled components, each isolated from one another and with a significantly reduced attack surface. This can restrict the number of opportunities for hackers to…