DevOps
Resources

FILTER BY

Pipeline DevSecOps

Pipeline DevSecOps

La popularité de l’approche DevSecOps est en hausse, et ce pour de bonnes raisons. L’adoption de DevSecOps peut aider votre équipe à réduire les risques, à simplifier le respect de la conformité et à intégrer la sécurité dans vos pipelines d’intégration continue et de livraison continue (CI/CD). Cependant, il n’est pas toujours facile de savoir…
Containers vs. VMs: What’s the Best Choice for Your Workloads?

Containers vs. VMs: What’s the Best Choice for Your Workloads?

Containers and virtual machines (VMs) are nothing new. The concepts of resource partitioning and multi-tasking date back as far as the 1960s—from which VMs and containers evolved over the following twenty years. But the two technologies have only relatively recently started to take off. VMs were the first to go mainstream in the early 2000s.…
Comprendre et construire des images Docker: un guide pour les débutants

Comprendre et construire des images Docker: un guide pour les débutants

Dans cette introduction, nous vous présenterons non seulement les bases des images Docker, mais nous vous montrerons également où trouver des images prêtes à l’emploi qui vous donneront une longueur d’avance dans la création de vos propres applications, outils et services conteneurisés. En tant que nouvel utilisateur de Docker, vous devrez également comprendre comment créer…
The Role of Containers in Your Microservice Architecture

The Role of Containers in Your Microservice Architecture

The enterprise approach to application deployment has changed dramatically over the past two decades. As low-cost commodity servers replaced mainframes throughout the late '90s and early 2000s, companies finally found an affordable way to isolate their applications from one another. They were able to deploy just one main service to each physical machine. And they…
Leveraging Cloud Native Tools in a Hybrid Cloud Environment

Leveraging Cloud Native Tools in a Hybrid Cloud Environment

Cloud native tools, which run in distributed environments, can be deployed in any type of cloud – public, private or hybrid. You don’t need a specific type of cloud architecture to go cloud native. However, when you opt for a hybrid cloud – which means a cloud environment that combines public cloud resources with resources…
The Top 6 CI/CD Best Practices

The Top 6 CI/CD Best Practices

The most recent State of DevOps report from Google’s DevOps Research & Assessment (DORA) team found that “elite” performers recover from incidents 2,604 times faster and have a failure rate that is 7 times lower than “low” performers. In the world of DevOps continuous integration/continuous development (CI/CD), these statistics that show an extreme gap between…
Kubernetes Registry

Kubernetes Registry

Kubernetes, also known as K8s, has proven to be one of the most important open-source projects released in the last decade. From Capital One to Huawei to The New York Times, the container orchestration platform has proven integral to building and scaling countless software projects across the globe. Of course, Kubernetes isn’t the only tool…
An introduction to DevOps and CI/CD

An introduction to DevOps and CI/CD

Here, we’ll provide an introduction to DevOps, pipelines, and CI/CD for beginners. We’ll cover key CI/CD concepts, terminology, and point you to resources that can help you build your first CI/CD pipeline. What is DevOps? We’ve defined DevOps before, but let’s have a quick review before moving on to CI/CD. As you might expect, DevOps…
Top 5 CI/CD Tools to Look Out For

Top 5 CI/CD Tools to Look Out For

Automation and continuous integration/continuous development (CI/CD) can have a huge positive impact on how developers and IT operations work. For example, one of the key takeaways from GitLab’s  2020 Global DevSecOps Survey was how CI/CD tools are enabling dev and ops to be more productive by eliminating the need for manual intervention in tasks such…
Docker Image Security: 6 Must-Know Tips

Docker Image Security: 6 Must-Know Tips

As Docker grows in popularity, so does news of Docker security issues. Earlier this year, for instance, the Doki backdoor was used to exploit misconfigured Docker API ports and install cryptominers or other malware. Initially described as undetectable, today only 36/61 scanners on VirusTotal properly flag Doki as malware. Doki is just one example of…