Day: February 10, 2015

‘UP Your OPs Game’ By @DTzar | @DevOpsSummit [#DevOps @MS_ITPro]

Want to enable self-service provisioning of application environments in minutes that mirror production? Can you automatically provide rich data with code-level detail back to the developers when issues occur in production? In his session at DevOps Summit, David Tesar, Microsoft Technical Evangelist on Microsoft Azure and DevOps, will discuss how to accomplish this and more…

Where Did My Love for Data Start? By @JimKaskade | @CloudExpo [#BigData]

Whenever Jack visited me, he used to leave sticky notes on my desk with nuggets of wisdom. For example, “Keep people you trust close to you.”…or, “Key values for Teradata where: Pride, Enthusiasm, Importance of the Individual, Teamwork and Open Communications, Ethics, Dedication, Quality, Support, Success, and Entrepreneurship.” In the month of July, 1999, Jack…

New Foundation Will Oversee Popular Coding Tool Node.js

Node.js – the popular open source tool for building and running websites and other online applications – is getting a new steward. Together with Microsoft, the Linux Foundation, IBM, PayPal, and Fidelity, the current steward, Joyent, is launching an independent foundation to oversee development of the project. Source: Tech

Red Hat and NEC collaborate to achieve carrier-grade OpenStack solutions for NFV

Red Hat, Inc., the world’s leading provider of open source solutions, and NEC Corporation, a leading provider of innovative IT, network and communications products and solutions, today announced a collaboration to jointly develop network functions virtualization features in OpenStack in order to deliver carrier-grade NFV solutions with Red Hat Enterprise Linux OpenStack Platform. As communication…

‘DevOps Done Right’ By @st0rmz | @DevOpsSummit [#DevOps]

DevOps is the hottest moving target when it comes to software development methodologies. Many people fear that this fast-paced, barrier-breaking movement will leave information security best practices in the dust. Analysts provide recommendations to security professionals using bingo-laden terms like “moving security to the left” or “get a seat at the table.” What we need…