terriblecode - How Docker Images Work: Union File Systems for Dummies
https://terriblecode.com/blog/how-docker-images-work-union-file-systems-for-dummies/
https://terriblecode.com/blog/how-docker-images-work-union-file-systems-for-dummies/
terriblecode
How Docker Images Work: Union File Systems for Dummies
Ever wonder how Docker images work? Well it's called a Union File System and it's not as hard as it sounds!
Detection of Anti-Patterns in Continuous Integration (CI)
https://www.surveygizmo.com/s3/4485492/CI-Anti-Pattern-Detection
https://www.surveygizmo.com/s3/4485492/CI-Anti-Pattern-Detection
Surveygizmo
Detection of Anti-Patterns in Continuous Integration (CI)
Detection of Anti-Patterns in Continuous Integration (CI).
GitHub - adaptivecapacitylabs/Resilience-Engineering-Resources: This is a collection of readings, talks, and other bits regarding the field of Resilience Engineering
https://github.com/adaptivecapacitylabs/Resilience-Engineering-Resources
https://github.com/adaptivecapacitylabs/Resilience-Engineering-Resources
GitHub
GitHub - adaptivecapacitylabs/Resilience-Engineering-Resources: This is a collection of readings, talks, and other bits regarding…
This is a collection of readings, talks, and other bits regarding the field of Resilience Engineering - adaptivecapacitylabs/Resilience-Engineering-Resources
Build, deploy, manage modern serverless workloads using Knative on Kubernetes
https://m.chmarny.com/build-deploy-manage-modern-serverless-workloads-using-knative-on-kubernetes-180c1a55e1b5
https://m.chmarny.com/build-deploy-manage-modern-serverless-workloads-using-knative-on-kubernetes-180c1a55e1b5
Medium
Build, deploy, manage modern serverless workloads using Knative on Kubernetes
By now, Kubernetes should be the default target for your deployments. Yes, there are still use-cases where Kubernetes is not the optimal…
Evolution of Infrastructure Monitoring at ThousandEyes Engineering
https://blog.thousandeyes.com/evolution-infrastructure-monitoring-thousandeyes-engineering/
https://blog.thousandeyes.com/evolution-infrastructure-monitoring-thousandeyes-engineering/
Network Intelligence Blog | ThousandEyes
Evolution of Infrastructure Monitoring at ThousandEyes
Evolution of internal infrastructure monitoring at ThousandEyes from single monitoring instances to the scalable Insights platform.
2018 Serverless Community Survey: huge growth in serverless usage
https://serverless.com/blog/2018-serverless-community-survey-huge-growth-usage/
https://serverless.com/blog/2018-serverless-community-survey-huge-growth-usage/
serverless
2018 Serverless Community Survey: huge growth in serverless usage
We asked you, our dev community, how you’re using serverless. And even we were surprised by how much things have grown. Ready for the data?
Introduction to Test Kitchen
https://www.slideshare.net/nathenharvey/introduction-to-test-kitchen
https://www.slideshare.net/nathenharvey/introduction-to-test-kitchen
www.slideshare.net
Introduction to Test Kitchen
Test Kitchen is a test harness to execute infrastructure code on one or more platforms in isolation. Easily create, automate, verify, and destroy infrastructur…
Sysdig | Runtime Container Security - How to Implement Open Source Container Security (Part 1)
https://sysdig.com/blog/oss-container-security-runtime/
https://sysdig.com/blog/oss-container-security-runtime/
Sysdig
Runtime container security – How to implement open source container security (part 1). | Sysdig
This open source security guide is a comprehensive resource for anyone who wants to deploy an open source container security stack for Docker or Kubernetes.
Sysdig | Docker Image Scanning - How to Implement Open Source Container Security (Part 2)
https://sysdig.com/blog/container-security-docker-image-scanning/
https://sysdig.com/blog/container-security-docker-image-scanning/
Sysdig
How to implement Docker image scanning with open source tools | Sysdig
This article will explain how to to deploy open source Docker image scanning: both on private Docker repositories, and as a CI/CD pipeline validation step.
10 monitoring talks that every developer should watch | TechBeacon
https://techbeacon.com/10-monitoring-talks-every-developer-should-watch
https://techbeacon.com/10-monitoring-talks-every-developer-should-watch
TechBeacon
10 monitoring talks that every developer should watch
Watch 10 of the most enlightening talks on monitoring and see how Facebook, Google, Spotify, and Stripe monitor.
11 Ways (Not) to Get Hacked - Kubernetes
https://kubernetes.io/blog/2018/07/18/11-ways-not-to-get-hacked/
https://kubernetes.io/blog/2018/07/18/11-ways-not-to-get-hacked/
Kubernetes
11 Ways (Not) to Get Hacked
Kubernetes security has come a long way since the project's inception, but still contains some gotchas. Starting with the control plane, building up through workload and network security, and finishing with a projection into the future of security, here is…
5 Hard Lessons From Microservices Development - DZone Microservices
https://dzone.com/articles/5-hard-learnings-from-micro-services-development
https://dzone.com/articles/5-hard-learnings-from-micro-services-development
dzone.com
5 Hard Lessons From Microservices Development - DZone Microservices
This article will help you learn about overcoming challenges in tools, training, and methodology when developing microservices architecture-based applications.
5 steps to speed up your image heavy website – codeburst
https://codeburst.io/5-steps-to-speed-up-your-image-heavy-website-65c874a86966
https://codeburst.io/5-steps-to-speed-up-your-image-heavy-website-65c874a86966
Medium
5 steps to speed up your image heavy website
Images are a key component of every website. According to HTTP Archive images make up for more than 60% of data loaded on web pages. Being…
A Brief History of Containers - Mesosphere
https://mesosphere.com/blog/brief-history-containers/
https://mesosphere.com/blog/brief-history-containers/
Mesosphere
A Brief History of Containers - Mesosphere
Learn how the abstraction of containers and the granularity of microservices are changing the face of software architecture, development, and operations.
A milestone for Chrome security: marking HTTP as “not secure”
https://www.blog.google/products/chrome/milestone-chrome-security-marking-http-not-secure/
https://www.blog.google/products/chrome/milestone-chrome-security-marking-http-not-secure/
Google
A milestone for Chrome security: marking HTTP as “not secure”
We're marking all sites that are not encrypted with HTTPS as “not secure”.
A Primer on Building a Monitoring Strategy for Amazon RDS
https://www.sumologic.com/blog/amazon-web-services/amazon-rds-monitoring-strategy/
https://www.sumologic.com/blog/amazon-web-services/amazon-rds-monitoring-strategy/
Sumo Logic
A Primer on Building a Monitoring Strategy for Amazon RDS
This Sumo Logic article provides details on how and why modern organizations should build a monitoring strategy for Amazon RDS.