One of the Agile principles is simplicity—the art of maximizing the amount of work not done is essential. Kubernetes provides simplicity through different features based on the Single Responsibility Principle for decoupling, and through automating tasks such scaling, resource allocation, and making updates.
Companies unleash their true potential in today’s ever-changing, constantly evolving world through digital transformation. Implementation of cloud-based Software as a Service (SaaS), when combined with Agile methodology and DevOps, represents a strong value proposition
With 2018 well underway, it seems like a good time to look ahead and think about what we hope to accomplish this year. Find out which agile trends these software experts are most looking forward to in the coming months.
Containers are taking the virtualization model to greater heights by enabling a flexible way to programmatically provision the resources you need. New technology also means we need new processes and failsafes, though. Containers hold a great deal of promise, but are they really ready to be used in production environments?
End-users are demanding anytime, anywhere access to software apps on their devices. These changes are shifting the way software vendors conduct business. Michael Zunke uses the results of industry surveys to show how software products and services should be licensed.
As user needs change for software apps expanding into IoT, mobile, and the cloud, testing approaches need to change. Shyam Ramanathan discusses eleven of the most important testing trends you should incorporate.
High-stress situations arise when you have to respond to management's never-ending tough questions regarding product delivery. According to Johanna Rothman, you can properly set expectations without stress simply by understanding your manager's point of view.
Cloud-based software development definitely changes how project managers need to approach their projects and lead their teams. Cloud development is not the same as traditional software product development and requires a unique mix of traditional project management and agility. Project managers considering working on cloud-based projects need to read what Sridhar Kethandapatti has to say.
In this interview, Prathap Dendi speaks about Ship.io and why testers should be interested in continuous integration and continuous delivery, as well as why agile is such a natural fit for mobile development. Prathap also tackles the impact of cloud and mobile on international business.
Kerry Cox Jr. of Simplified Network Solutions talks about his recent work with Project Sierra, data encryption, the risks often overlooked in our ever-connected world, and how working for the government has helped to shape his career and views on the importance of Internet security.
Gareth Bowles of Netflix talks about his upcoming presentation at STARWEST 2014, how the cloud is all about fault tolerance, how his time at several Sillicon Valley start-ups has prepared him for joining Netflix, and how his career turned him from a developer into a tester.
Serverless cloud applications are becoming mainstream. Teams focus on developing and deploying code on a known technology stack and runtime, with fixed interfaces for application, database, and network, and they offer lower costs, faster development, and elastic growth.
As organizations embrace DevOps and IT value chain automation, we are seeing the explosive growth of infrastructure-as-code capabilities, fueled by cloud scripting technology. As infrastructure-as-code capabilities evolve, what role does testing play?
Serverless architectures take the idea of microservices to the extreme. To implement secure serverless architectures, you have to understand how to compartmentalize programs at the function level. You also need to factor in security practices: Serverless architectures are susceptible to traditional attacks such as SQL injection and command injection, along with a wide variety of privilege escalation and sensitive data disclosure attacks. Developers must consider what would happen if an attacker attempted to invoke each of their functions directly. What if one of those functions were to become nonresponsive? Designing, implementing, and maintaining serverless architectures dramatically increases the complexity of security. Join Eric Sheridan as he discusses how to implement distributed, secure identity management and entitlement enforcement across 250+ functions.