Features

New Relic Survey Unearths Observability Challenges
A New Relic survey found only 27% of respondents have achieved full-stack observability with only 5% claiming they have a mature observability practice in place. A third (33%) of respondents also said ...

Survey Surfaces Massive Number of Application Vulnerabilities
A survey of 16,510 IT and IT security practitioners published today by Rezilion, a provider of a platform for automating the remediation of software vulnerabilities, found nearly half of respondents (47%) worked ...

Rust Foundation Allies With OpenSSF and JFrog to Secure Code
The Rust Foundation announced today it is working with the Open Source Security Foundation (OpenSSF) and JFrog to help maintainers secure open source software created using the Rust programming language. Rebecca (Bec) ...

DevOps World 2022: DevOps Tail Wags the Dog of Digital Business
As a methodology for building and deploying applications faster, DevOps has been around for more than a decade. But it's only now that the methodologies and concepts pioneered years ago are starting ...

Five Great DevOps Job Opportunities
DevOps.com is now providing a weekly DevOps jobs report through which opportunities for DevOps professionals will be highlighted as part of an effort to better serve our audience. Our goal in these ...

Exploring the Emerging Role of FinOps
Cloud overspending is becoming a top-of-mind budget item for the modern CFO. To direct resource utilization in the cloud, some organizations are turning to increased automation and more diligent cloud procurement processes ...

DevOps World 2022: Developer and Security Links Protect Your Supply Chain
Ever since the SolarWinds attack back in December 2020, software supply chain attacks have been top-of-mind for any company that builds software. The idea of endangering not just your organization by being ...

DevOps World 2022: Using SBOMs to Secure the Software Supply Chain
As supply chain attacks become increasingly prevalent, visibility is emerging as a necessity in cybersecurity. One way to improve visibility and secure your software supply chain is with a software bill of ...

How’s Facebook Work? They Don’t Know! | Cali. Pay Law | NASA RISC-V Launch
In this week’s The Long View: Facebook engineers admit they’ve no idea what Meta stores (or where), California requires job ads quote salaries, and RISC-V will power future NASA spacecraft ...

Federal Agencies Share DevSecOps Guidelines
The National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA), and the Office of the Director of National Intelligence (ODNI) have published a set of DevSecOps best practices based on the Enduring ...

How to Go Multi-Cloud: A Simple Three-Step Approach
Odds are your business already uses cloud technology for automation, cybersecurity, IT infrastructure updates and other purposes. But you don’t have to stick to a single cloud server or provider. In fact, ...

Study: Real-Time Data Has A Transformative Effect
We all know that data is the heart of the modern digital business. And real-time data is arguably the next evolution—having up-to-date data can empower energy savings and optimizations to reduce cost ...