The seasons are changing, flowers are sprouting, and hopeful these small things are brightening your day. Another thing that might brighten your day are these posts from our authors in this week’s digest. Read them below.
Remote Management: A Detailed Guide and 8 Best Practices
Many organizations all around the world have started to adopt remote working. Some of them have been doing it for quite some time, but for others, it’s pretty new. Employees whose companies have recently implemented remote work have a lot of questions on their minds. Most of these questions are from managers who have to take care of tasks, track, and collaborate with their team. But you can learn all about remote management from Omkar Hiremath on Plutora’s blog.
In this post, Sylvia Fronczak covers what William Zhang, Andy Gao, and Srini Kasturi shared about their DevSecOps journey at the World Bank Group. Check it out on Sonatype’s blog.
Security is a broad topic, and there are no silver bullets to write a perfectly secure application, but there are some tools that can help. However, you can learn all about Nancy, a Go tool that can help improve the security of your Go applications by alerting you to any known vulnerabilities in your project’s dependencies. It’s very easy to incorporate Nancy into your CI pipeline and to run Nancy manually. Jonathan Hall can show you on Sonatype’s blog.
Curious about science of compliance? You’ll be able to have several questions about it answered then. You’ll even get to learn why it matters, and how to achieve it. Check it out in this post from Carlos Schults on Sonatype’s blog that summarizes Judy Johnson’s talk “The Science of Compliance: Early Code to Secure Your Node”.
Ansible vs Jenkins
One of the challenges, when you’re starting out with DevOps, is getting the lay of the land. There are a lot of tools out there. And when one of the goals of DevOps is continually improving your processes, it’s important for you to understand how those tools might fit in your infrastructure. At the same time, you want to be efficient. In this post, Eric Boersma breaks down the differences between two DevOps technologies, and how they can work for your team. Find out more on Stackify’s blog.
Microservices Tutorial: An Introductory Guide With Examples
Developers have been developing applications for years now. Of course, we’ve become better at it, and we’ve developed new ways to structure architectures. Recently, microservices architecture has gained a lot of popularity, as it better enables an agile approach to development. The microservices trend has emerged out of various business needs such as continuous delivery, continuous integration, and a massive need for scalability while building an understandable application architecture. And Michiel Mulders can give you a deeper dive into microservices on Scalyr’s blog.
How to Implement a Bug Bounty Program
Cybersecurity has become an increasingly trending topic for anyone in the technology space. With millions of attacks happening every day, people have started focusing on security more than ever before. The development, QA, and internal security teams do their best to secure their products. But it’s hard to catch everything internally, and there’s no harm in getting another opinion. The most common approach organizations use to find vulnerabilities in their applications in this age is bug bounty hunting. Learn more from Omkar Hiremath on Sqreen’s blog.
What Is a Site Reliability Engineer? Should You Become One?
We also updated a post this week on site reliability. Although site reliability engineering has been around for a while, it has only recently gained fame in general software circles. But there are still a lot of questions as to what a site reliability engineer (SRE) is and does. Find out more on Scalyr’s blog.