As you dig into DevOps methodology, you’re likely to encounter the term “shift left” and the slightly less common “shift right.” What exactly are we shifting here?
The two terms are sides of the same coin. They refer to when you will test your application or piece of technology – is it during development or once your solution has already entered production? Of course, for true DevOps success, the answer is both! Continuous improvement involves testing at all phases of the application lifecycle.
Let’s take a closer look at the ideology behind “shift left” and its counterpart as well as how they affect the development cycle (which can also be applied beyond app development itself and used when designing and deploying most IT systems).
As we approach year-end and look forward to future tech trends, we also reflect on the lessons learned over the past year. In the information security realm, things seem to stay the same even as they change.
Pervasive and persistent threats that are hardly new to the scene have made their way past small fry to take down some of the biggest service providers around. In many ways, 2019 proved the most effective threat vectors remain the most difficult to protect against, with the crucial attack point coming in the form of people – the hardest thing to control for within your organization.
There are some newer threats to consider as well, of course. Hackers never sleep!
Here’s our lineup for the nastiest InfoSec baddies of 2019.
It’s Thanksgiving week here in the United States, and while we’re all thankful for the usual suspects like our families, homes, health, and employment, there are some special things that technical workers are extra glad to have in the workplace.
Here are our Top 10 Things SysAdmins Are Thankful For in 2019:
Data migration takes many forms, including moving data between storage locations or mediums, changing the format of the data, and sharing or importing data between applications. It’s required when retiring a legacy system, introducing new apps or services, migrating to the cloud, or consolidating your data center.
Data storage can be a complicated beast thanks to the myriad ways data grows and integrates with various components of your IT infrastructure. A secondary goal of any data migration project should therefore be data management itself, reducing complexities introduced by application logic, customization, governance, and other entanglements.
Regardless of the destination of your data or the business drivers behind the migration, you’ll need to extract your data, modify it, and perform the actual data transfer. Detailed planning and risk evaluation are key before proceeding, especially as you are likely to handle some sensitive information.
It happens to everyone at some point. Your budget gets slashed; the economy tanks; you’re suddenly in the red thanks to cloud sprawl. Whatever the cause, you’ll likely face a mandatory cost cutting initiative at some point in your IT career.
While cost cutting is a reality, it is fundamentally different from ongoing cost optimization. You should be practicing cost optimization as part of your regular duties, reviewing spend and ensuring the technology, hardware, software, and services in use across your organization are serving their business need and appropriately configured in scope and performance.
By formulating and practicing a cost optimization protocol, you’ll be prepared should the day for cost cutting ever come, while also gathering evidence for the impact IT has on the overall bottom line.