Jul 31

In this getting started with StackEngine video, StackEngine walks through the deployment of common DevOps monitoring tooling, leveraging Datadog as… Read more at VMblog.com.

Jul 31

Consider that the benefits derived from proactive monitoring do not necessarily come from just one tool, albeit tool selection is a key element, but it is not the only one. “A fool with a tool is still a fool” – Grady Booch.
Listening to what your business partners need from an application perspective and then delivering on that within a tight timeline and a modest budget can create challenging opportunities for any IT Manager.

read more

Jul 31

National Savings Bank in Malaysia has implemented a sweeping enterprise content management system project and slashed paper use, increased productivity, rationalized storage and documents, and cut security risks, while adhering to compliance requirements.

read more

Jul 31

Unless you fully automate infrastructure and platform provisioning, application build, test and deployment phases and have them working together in sequence, you can’t realize the ideal of continuous delivery. These ‘automation tool chains’ are a mandatory element of each DevOps environment.
The number of manual activities in the application test and release processes can cause a downstream bottleneck. Changes pile up at the end of development and unit test activities in agile development environments like SCRUM or Kanban, therefore rendering them less effective. Automation tool chains significantly improve application delivery and operations performance in DevOps environments.

read more

Jul 31

“PLUMgrid is a software defined networking company - we provide virtual network infrastructure which plugs into any framework you’re using,” explained Dhiraj Sehgal of PLUMgrid in this SYS-CON.tv interview at Cloud Expo (http://www.CloudComputingExpo.com), held June 9-11, 2015, at the Javits Center in New York City.

read more

Jul 31

A recent purchase of mine was a 2015 Jeep. Until now, I thought it was a safe and reliable car, but that is not the case anymore. As technology advances and cars become smarter and more technologically savvy, they become another target for hackers.

Imagine speeding down the highway, zooming past 18-wheelers, SUVs and coupes, when all of a sudden, your brakes give out and your speed increases. Instantly, you think what could be wrong with the car, you pump your breaks and check your dash and there is no sign of stopping. Instant panic washes over you and a fear of dread drowns out the honking horns. This is what could happen, with the hackable car systems.

read more

Jul 31

Access is everything. It is the fundamental pillar that determines whether critical enterprise assets are safe or exposed. Knowing the answers to the questions of who is accessing what, where they are accessing that information from, why they are accessing that information and, finally, what exactly they’re accessing are the basic questions that stand between a breach and brand reputation.

read more

Jul 31

DevOps is first and foremost a mindset – any DevOps initiative must begin with a cultural change. Last Tuesday, I participated in an online panel on the subject of Implementing a DevOps Culture, as part of Continuous Discussions (#c9d9), a series of community panels about Agile, Continuous Delivery and DevOps. Watch a recording of the panel:
Continuous Discussions is a community initiative by Electric Cloud, which powers Continuous Delivery at businesses like SpaceX, Cisco, GE and E*TRADE by automating their build, test and deployment processes.

read more

Jul 31

Article written by Leo Reiter I’ll be very clear up front… I am not a big believer in private cloud (versus public cloud) for most organizations… Read more at VMblog.com.

Jul 30

Skyscape Cloud Services Limited, the easy to adopt, easy to use and easy to leave assured cloud services company is embarking on an aggressive… Read more at VMblog.com.

«     |     ?     |     »