Insights

Expert perspectives on DevOps, AI, cybersecurity, and modern software engineering.

GitLab Global Survey Highlights a Continued Struggle with Software Testing Custom Software Development

GitLab Global Survey Highlights a Continued Struggle with Software Testing

Resources, communication, and delays to the release of software continue to hinder software testing according to a global annual survey conducted by GitLab

How GitOps Goes Beyond Kubernetes DevOps

How GitOps Goes Beyond Kubernetes

With improved automation and less risk, GitOps is quickly becoming the workflow of choice for infrastructure automation. And for GitLab, the approach to Gi

Beta APIs Disappearing from Kubernetes v1.22 DevOps

Beta APIs Disappearing from Kubernetes v1.22

Thinking about moving on to Kubernetes v1.22? Before you do, check out the list of beta APIs that will be removed -- not deprecated -- in the new version.

How to Name Django Migrations (and Why It's Important) Custom Software Development

How to Name Django Migrations (and Why It's Important)

Migrations became a pretty popular feature with developers after being released with Django 1.7. Unfortunately, the practice of coming up with descriptive,

node 15 vs node 16 graphic Custom Software Development

Node 15 vs. Node 16

April 20, 2021 OpenJS released Node 16, the latest major version of one of the most popular JavaScript runtime environments. Here's what you need to know.

Handling Auth in EKS Clusters: Setting Up Kubernetes User Access Using AWS IAM Cloud

Handling Auth in EKS Clusters: Setting Up Kubernetes User Access Using AWS IAM

Deploying a shiny new EKS cluster running the latest version of Kubernetes isn’t the hardest task in the world. On the other hand, setting up the authentic

How Proper Documentation Can Help Improve the Effectiveness of Your Cybersecurity Program Cybersecurity

How Proper Documentation Can Help Improve the Effectiveness of Your Cybersecurity Program

Documenting your policies and procedures can help improve organizational situational awareness and demonstrate organizational accountability.

Five Things to Consider When Selecting a Third-Party Technology Company DevOps

Five Things to Consider When Selecting a Third-Party Technology Company

Everyday, companies of all sizes partner with third-party technology vendors to solve tough technology problems. Picking the right partner for your success

conceptual, strategy arm holding a wrench Cybersecurity

5 Tips for an Effective Cybersecurity Program

Organizations are shifting which means new risks to data and critical systems. See our 5 tips to help keep your cybersecurity program on track.

What Is a Zero-Trust Architecture and How Does It Compare to Traditional Network Designs Cybersecurity

What Is a Zero-Trust Architecture and How Does It Compare to Traditional Network Designs

There’s been a lot of talk lately about zero-trust architectures in the wake of the Colonial Pipeline Ransomware attack and the White House Executive Order

What the Executive Order on Improving the Nation’s Cybersecurity Means to You Cybersecurity

What the Executive Order on Improving the Nation’s Cybersecurity Means to You

On May 12, the White House released the Executive Order on Improving the Nation’s Cybersecurity, focusing on Federal systems and resources in the wake of t

What Can We Learn From the Colonial Pipeline Ransomware Attack? Cybersecurity

What Can We Learn From the Colonial Pipeline Ransomware Attack?

While the brazen attack of the Colonial Pipeline is cause for alarm, it’s not surprising. One of the most important things your organization can learn from