Operations | Monitoring | ITSM | DevOps | Cloud

DevOps

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

What Is IPv6? Definition & Full Overview

Poised to redefine the landscape of digital communication stands the groundbreaking achievement that is IPv6, the sixth generation of the Internet Protocol. The evolution from IPv4 to IPv6 marks a pivotal shift in internet technology, driven by the increasing scarcity of IPv4 addresses and the expanding scale of the global network.

Applied Category Theory for Cloud Native Innovation with Sal Kimmich - Navigate Europe 23

Join Sal Kimmich at Navigate Europe 23, where they delve into the intricate world of Applied Category Theory and its application in cloud-native technology. With a unique blend of technical expertise and psychological insights, Sal explores the significance of abstract thinking in Kubernetes engineering and cybersecurity.

Episode 10: From the Court to the Cloud How Solo.io became a billion dollar unicorn

On this episode, Shon goes in-depth with Idit Levine, founder and CEO of solo.io, an application networking unicorn valued at over $1 billion. They explore Edith's journey from professional basketball in Israel to leading solo's meteoric rise at the bleeding edge of cloud-native infrastructure.

What Is CIDR? Classless Inter-Domain Routing Explained

In the early 1990s, as the digital world stood on the cusp of an explosive expansion, the foundational structure of the internet faced a critical challenge: the classful IP addressing system was buckling under its own rigidity and inefficiency. Locked into fixed classes (A, B, and C), this system squandered valuable IP space, leaving the burgeoning network gasping for air as it grappled with rapidly depleting IP addresses.

Monitor Docker With Telegraf and MetricFire

Monitoring your Docker environment is critical for ensuring optimal performance, security, and reliability of your containerized applications and infrastructure. It helps in maintaining a healthy and efficient environment while allowing for timely interventions and improvements. In general, monitoring any internal services or running process helps you track resource usage (CPU, memory, disk space), allowing for efficient allocation and optimization.

How Authorization Evolves with Alex Olivier: From Basic Roles to ABAC - Navigate Europe 23

Join Alex Olivier as he delves into the transformative journey from basic role-based authorization to the more sophisticated, decoupled Attribute-Based Access Control (ABAC). With his extensive background in software engineering and product management, Alex provides invaluable insights and personal experiences in navigating the complexities of authorization in the modern tech landscape. Discover the crucial differences between authentication and authorization, and learn about the challenges and solutions in implementing effective authorization strategies in your systems.