The weather is getting colder but our authors are still writing posts like they’re coming hot off the press. Check out what they’re been covering below.

Your Detailed Introductory Guide to the Kanban Board

So you want to learn a little bit about Kanban? That’s great! Kanban is a system for both visualizing and organizing work. Kanban’s goal is to help identify parts of your process where waste occurs and encourage you to break work down into small chunks. It’s all about the flow of work through your system. Find out more on Plutora’s blog from Chris Tobolski.

CakePHP is an open-source framework for web development written in—you’ve guessed it—PHP. It allows its users to write database-backed web applications in a fast, flexible, and secure manner. Carlos Schults is here to fill you in on Scalyr’s blog.

Artillery Load Testing Introduction: See How Your Code Scales

Not that long ago, it wasn’t hard to find developers and other tech workers who were either skeptics about automated testing, or totally unaware of its existence.  Sure, there are still skeptics among us, but their numbers have been dramatically reduced. Automated testing is now an everyday reality in many software organizations. Tools for performing automated testing have exploded, as well as the number of types of automated testing. But Carlos Schults is here to tell you about a super-specific category of automated testing: Artillery load testing. Find out more on Testim’s blog.

A Complete Guide to Getting Started With the Node Debugger

Diagnosing and finding the root cause of issues is a crucial skill in software development. Software engineers spend the majority of their time reading and understanding existing code. Because of this, knowing how to debug your applications with proficiency will save you time and make you more effective. And Jonny Nabors can help you out on Raygun’s blog. 

What Is the Difference Between Data Integrity and Security?

The data confidentiality principle is all about keeping data private and secret. These days, data is the new digital currency, and nefarious hackers, state-sponsored actors, disgruntled employees, and occasional or recreational hackers are keen to get their hands on it. These could include the organization’s intellectual property data, personal data, health data, payment data—and the list goes on. Getting the confidentiality principle right is not only a business priority but also mandated by laws and regulations. Data encryption, authentication, and authorization technologies will help you make sure you use them wisely. Learn more from Janos Zold on DataOps Zone. 

What Is Cloud Computing?

So you’ve heard about cloud computing, but you want to know more? There’s a lot more to cloud computing than simply offloading your IT department onto another company. There are also many different ways that you can engage in cloud computing, and they all have a different impact on your company. And these differences are what you can explore on ASPE’s blog. Find out more from Lou Bichard here. 

Agile and DevOps: Understanding the Relationship

It wasn’t too long ago when software updates were made every few years. For example, think back to when Office 95 dominated the market. It took Microsoft 15 months to release the next main update to the Office suite, Office 97. Three years after that, Office 2000 followed suit. You get the gist. In fact, today’s leading companies are continuously updating and improving their software. A lot of the time, these updates occur in the background—without the end user even knowing. In large part, this is due to the emergence of new tools designed to increase transparency and streamline collaboration across development teams. Simply put, these tools help developers build more powerful software in less time. Learn more about this from Justin Reynolds on ASPE’s blog. 

How to Transition into DevSecOps

Many of us have been living the DevOps life for a while now. We no longer just write the applications and leave the rest of the lifecycle to others. We’re integrated into the entire process of getting applications to production and beyond. And this has provided great benefits to our customers. We get features out faster and fix defects quickly when something slips by. But what if the defect that slips by is security related? Do we have the tools we need to make sure we’re doing all we can from a security standpoint? Sylvia Fronczak is here to help you out on Sqreen’s blog. 

How to Mitigate Security Threats to Data Assets: A Guide

Have you ever wondered how you could reduce security threats and risks against your data assets? Or even better, how you could eliminate threats to your organization’s data entirely? If so, this article from Janos Zold on DataOps Zone about how to mitigate security threats to data assets is for you.

What Is Data Compliance? A Guide to Navigating Standards

Data compliance is a critical component of any company’s data management efforts, but it suffers from an image problem. Compliance is often seen as dull and boring, a long list of rules to check off simply to satisfy a control group. But data compliance is so much more than this. Done right, data compliance will both reduce risk in your business and potentially differentiate you from your competitors. Learn more on the DataOps Zone blog from Daniel Longest.

What Does a Data Security Analyst Do?

Who wouldn’t want their data to be secure? Data security plays an important role for individuals and for organizations ranging from startups to multi-billion-dollar companies. But when it comes to security in data centers and on networks, things get a little complicated. And that’s where a data security analyst comes in. Omkar Hiremath can fill you in on DataOps Zone.

How to Go Serverless With AWS Lambda

We also updated a few posts. Going from servers in months to servers in minutes is a major improvement. But have you ever thought of executing code with no servers? On Stackify’s blog, you will learn about serverless, why it matters, and how to go serverless with AWS Lambda.

Another post that we updated covers DevOps and SRE. If you happen to know what SRE is, you might be wondering how it relates to DevOps. Well, let’s not beat around the bush. There’s no “versus”—there’s only a different approach for how to deliver better software faster. Find out more on Scalyr’s blog.