Delft, Netherlands
Jun 23, 2020   |  By Simon Barendse
Last Tuesday, the Go team published an updated draft design for Generics in Golang, and they are providing an experimentation tool, which lets you play around with generics. This makes it easier to see what your code would look like when using generics. We’re super excited about this and can’t wait to try it out! We’ll be using our use case to show what impact generics could have on production code.
Apr 2, 2020   |  By Josephine Mackenbach
Welcome to the new age, where the majority of the working population doesn’t have their colleagues at arm’s length anymore. We’ve gone radically digital, but are your processes and infrastructure ready for this? Here are our tips to make sure you give your processes, infrastructure and security the attention they deserve. Both in day-to-day operations and in incident response.
Oct 30, 2019   |  By Floris van der Grinten
If you’ve tried to implement secret management into your infrastructure, then you’ve likely run into this problem: How can you build your app so it can independently load the passwords and API keys it needs, without placing some magic keyfile somewhere? We’ll show you how we eliminated this last secret on AWS and how you can do the same for your infrastructure.
Sep 25, 2019   |  By Floris van der Grinten
We’re thrilled to announce that you can now create shared workspaces for free! Previously, collaboration was a paid feature. If you wanted to create a shared workspace, you were prompted to start a 14-day trial. We went around the team and asked: “When was the last time you started a trial for a developer tool?” Turns out our own developers avoid them at all cost and really want to see the full tool in action without being constrained by time.
Jun 26, 2019   |  By Floris van der Grinten
The pipelines we set up to deliver the software we create — consisting of infrastructure as code, configuration management, CI services, orchestrators, and more — tend to share a fundamental flaw: They pass application secrets down the delivery pipeline, and along the way leave traces of your most critical infrastructure secrets. Secrets end up in all sorts of JSON files, container definitions, jobspecs, ConfigMaps, and much more.