Operations | Monitoring | ITSM | DevOps | Cloud

Latest Videos

Github Checksums and Broken Pipelines: How to Prevent Disruptions

This week, GitHub changed how the archives they provided are made. The result of this change surprised developers, triggering pipeline failures all over the world in most ecosystems. This change has thankfully been retracted. Hear from JFrog Developer Advocate, Christopher McArthur on why this took place and the best practices to prevent future disruptions to your pipelines.

JFrog Connect IoT Device Management Solution

JFrog Connect is an all-in-one platform to manage, update, control, monitor and secure remote Linux & IoT devices, at scale, with the click of a button. New products are being developed all the time, and in today's world they are all smart, connected with complex software. Save development time with the first plug and play device management platform for connected devices - with all the necessary tools and features to manage and maintain the product fleet remotely. Including over the air update tools, remote debugging, monitoring and securing.

JFrog Quick Tip How to install and connect the JFrog CLI

With the JFrog CLI, you have access to the functions of the JFrog Platform, such as Artifactory and Xray. In this way, for example, the extended security functions of Xray can be made available directly in a terminal on a laptop. In this quick tip, I will show you where to get the JFrog CLI, install it and connect it to your platform. This works with the free tier, the Enterprise Trial, and all other subscriptions and on-prem installations.

DevOps 101: Introduction to Package Management

When you’re new to an industry, you encounter a lot of new concepts. We tend to use a lot of jargon, the documentation may be written for someone more experienced in mind or rely on contextual knowledge of the rest of the space, and it often doesn’t explain the “why” for the tool. This can make it really difficult to get your feet underneath you in an unfamiliar landscape, especially for junior engineers.

Supply Chain Security Workshop

More and more attacks are aimed at the entire supply chain, which means that we developers are increasingly targeted by the attackers. Attacks like the SolarWinds hack show us that making sure you don’t use vulnerable dependencies isn’t enough. The attackers have their sights set on the entire development process with its components. In this workshop, we will look at the first steps and try them out in practice which will enable you to integrate the topic of security into your everyday life as a developer.