SOC 2 compliance sends a strong signal to potential customers that your organization cares about security and data privacy. Turns out, you can achieve SOC 2 quick wins through just a few development best practices detailed in the below guide. Even if you're not pursuing SOC 2 compliance yet, why not apply them? Cheers,
Everything is going into source control, so why not DNS records? Mahmoud Dolah's tech lead told him: “I don’t want to have to ever see the Dyn console for the rest of my life”.
"I love software that does this: Software that unbloats over time. This should be the goal of all software. The longer it’s around, the more elegant it should become. Smooth over like a river stone." Like Sublime Text 👍
As container technology has evolved and matured, deficiencies and limitations in the process of container image building have slowly been exposed. This article talks about each of those areas.
Well aren't DevOps engineers just glorified sysadmins? Just kidding 😝 In this article, Taz Brown details the learning curve going from sysadmin to DevOps engineer.
Julia Grace was asked to build Slack’s first Infra Eng org in August 2016, when Slack was 2 years old and the original infra was breaking. In this presentation, she discusses the architectural and organizational challenges, mistakes and war stories of 2.5 years that followed.
Probably not the best name thanks to all the advertising Monday.com has been doing, but seems like a neat tool for running local applications and/or forward others from/to Kubernetes SSH or TCP.
Join 5,000+ subscribers of hand-curated
Kubernetes and IAC articles