Anaxi Delivers Project Management App for DevOps

Source- devops.com Anaxi, a provider of project management software designed specifically for DevOps teams, has made its web application generally available. The web application complements an existing iPhone application, while an Android version of the company’s project management application is still under development. Company CEO says Marc Verstaen said that as DevOps has evolved around multiple repositories, IT organizations are finding it challenging to keep track of code from projects they are using within what applications. Anaxi is designed to not only

Read more

DevOps shops size up security and compliance as code

Source – techtarget.com IT pros in DevOps shops want compliance and security to be the next things they automate, but people with the right skills are tough to find. AUSTIN — As enterprise IT pros gain experience with DevOps and infrastructure as code, they also begin to assess whether code can help with IT security and compliance problems. Products such as Chef Compliance and InSpec are on the minds of DevOps pros at ChefConf here this week. InSpec is an open

Read more

Storing code in the cloud: Yes or no?

Source:- jaxenter.com Cloud computing is undoubtedly one of the biggest things to happen in the IT world in recent years, and it has quickly emerged as a preferred method of safe and convenient data and document storage. Spending on cloud services is rapidly increasing, with experts estimating a global revenue jump from $80 billion in 2015 to $167 billion in 2020, yet adoption rates of cloud computing aren’t quite where we’d expect. So why is this? Interestingly, there are some

Read more

Report: 111 billion lines of code will have to be secured this year

Source:- sdtimes.com As new pieces of software are being written every day, the threat of malicious hacking continues to grow. According to a new report, there will be about 111 billion lines of new software code created this year, and with them will come billions of software vulnerabilities. “Applications have become inviting targets for malicious actors, but securing those programs has proven to be challenging to both security teams and developers,” according to the report. “Too often, key vulnerabilities get

Read more