content writing & editing : a smattering

Content Writing & Editing

Have a look at some of my B2B and B2C writing and editing below.

Tool Sprawl in DevOps

If you’re a developer, DevOps engineer, or security technician, you know the feeling of managing multiple tools at once. It’s a phenomenon so prevalent in software development that it has its own name, “tool sprawl,” and it can make it hard for teams to do their jobs efficiently.

Tool sprawl occurs when teams use too many tools to complete a task. This typically happens over time as new toolsets get added to tackle unique problems a dev team is facing. Sprawl can lead to complexity, fragmentati

Argo CD Finalizer Shield

ArgoCD is a popular tool by the CNCF (Cloud Native Computing Foundation) for managing and deploying applications on Kubernetes clusters. It provides a declarative and GitOps-based approach to application delivery, allowing DevOps teams to automate and standardize their workflows across different environments. However, as the number of clusters and applications grows, so does the complexity of managing them.

In ArgoCD, clusters are represented as Kubernetes Secrets stored in the ArgoCD namespace

4 Ways Software Supply Chain Platforms Streamline DevOps Best Practices

Today’s software developers are tasked with a lot more than just coding. To keep up with the fast-paced software-driven economy, they need to focus on automation, collaboration, security, distribution, data analysis, and agility to ensure quality builds and get releases to customers quickly and securely. DevOps and security professionals need a centralized system of records that provides visibility across the business. And developers need a fully integrated secure automation platform at their fi

JFrog's 2023 Software Artifact State of the UnionThe 2023 Guide to DevOps and Security Tool Consolidation

As organizations look to cut costs, increase efficiency, and improve security, tool consolidation is becoming an urgent need.

In this eBook you’ll learn best practices, tips, and areas to start consolidating your tool sets for greater efficiency, security, and cost optimization.
• How to think about tool consolidation (capabilities, impacts, ROI)
• Issues that teams must overcome and face to successfully consolidate tools
• Consolidation use cases from security to artifact storage

Platform Engineering Explained

If DevOps is an approach to software development that emphasizes collaboration between Development and Operations teams, then Platform Engineering operationalizes that approach by creating a centralized platform that has specific sets of tools and processes. It’s the discipline of designing and building toolchains and workflows that enable self-service capabilities for software engineering organizations in a cloud-native era. It focuses on the interconnectivity between components and how they af

Centralizing and Automating Remote Fleet Management

This company makes industrial programmable logic controllers (PLCs) and has 2,500+ customers across the world who use their products in prototyping and production environments.

Updating software in Linux-based industrial controllers in the field requires multiple steps and addressing complex scenarios. The company was looking for a solution to provide software automation and apply DevOps practices for IoT and Edge devices. This included the ability to build and automate multi-step command seque

DevOps Security for eSports Platform - Use Case

SECURITY FIRST FOR MOBILE GAMES AND ESPORTS

This enterprise eSports and mobile gaming platform is trusted by 75 million users in India and Indonesia and 90 million users worldwide. It offers multiple Android and iOS applications across categories such as casual games, card games, fantasy gaming, and esports.

The company employs over 1,000 employees across offices in Bengaluru, Pune, New Delhi, Jakarta, Singapore, and New York.

Reputation is make-or-break in mobile gaming and eSports, where pl

Customer Success Story: Telehealth

This leading online telehealth company is at the forefront of developing telemedicine ‌technology that facilitates connections between patients and doctors while making access to remote, online healthcare easier. The company’s clientele is extensive, spanning across the globe, and operating in a highly regulated healthcare industry that requires strict network security protocols and procedures. Their customer base was growing rapidly so they needed to ensure they had the ability to efficiently d

Release Lifecycle Management Now in Beta | Artifactory

Releasing production-ready software is a complicated tangle of tools and processes lacking visibility, traceability, and consistency. This leads to custom integrations and human intervention, which create opportunities for mistakes, impede automation, and increase the likelihood of insecure software being released.

Let’s take a look at these new capabilities and how they can help improve your software development process.

Creating a new level of trust and automation of software releases

While

GitHub Checksums and Broken Pipelines: How to Prevent Disruptions

Yesterday, GitHub changed how the archives they provided are made. The result of this change surprised developers, triggering pipeline failures all over the world in most ecosystems. According to this GitHub post, this is a consequence of recent changes to Git itself, released almost six months ago and just deployed within GitHub now with unforeseen impact. This change has thankfully been retracted.

Why did this change to GitHub archives break your pipeline?

It’s standard practice for develope

How to identify and avoid malicious code in your software supply chain

Malicious Software Packages Series Part 4 of 4: How malicious packages can be avoided and detected, and which obfuscation techniques they use to hide malicious code

Wow! We made it to the last post in our Malicious Packages series. While parting is such sweet sorrow, we hope blogs one, two, and three provide insights into the havoc malicious packages cause throughout your DevOps and DevSecOps pipelines.
• We explained what software supply chain attacks are and learned the critical role maliciou

Case Study: Ndustrial Expands Globally With Help From Connect

Ndustrial uses JFrog Connect to create innovative Internet of Things solutions for industrial operations that ultimately saves customers tens of thousands of dollars a day in energy costs.

Ndustrial has helped clients avoid over $100 million in potential energy spend. They merged computer science and industrial engineering to build a real-time energy intelligence platform. Today, Ndustrial delivers the industry’s only “production-first” Energy Intensity platform, enabling companies to maximize

Optimizing Developer Performance and Security in the SDLC

OPTIMIZE DEVELOPMENT PERFORMANCE AND ENHANCE SECURITY IN THE SOFTWARE DEVELOPMENT LIFECYCLE

This enterprise fortune 500 company is one of the world’s largest retailers with 500+ stores across the globe, 9,000+ employees and 5,000 developers. The Cloud Acceleration (tools, automation and education) team at this enterprise company helps their developers move faster and meet high standards for uptime, performance and security. They are constantly updating their developer tools and resources to ens

Common Payloads Attackers Plant in Malicious Software Packages

In this third post in our series on Malicious Software Packages, we’ll focus on the aftermath of a successful attack and how the attacker executes payloads to serve their needs through various real-life scenarios.

Before we start, let’s review a few highlights from the second post you might’ve missed:
• None There are common types of infection methods attackers use to spread malicious packages—we’ve mentioned five of them.
• None The infection methods include typosquatting, masquerading, trojan

5 Examples of Malicious Package Infection Methods Attackers Use|

Malicious Software Packages Series Part 2 of 4: This is how JFrog’s security researchers found these malicious code attacks

Welcome to the second post in our series on Malicious Software Packages. This post focuses on the infection methods attackers use to spread malicious packages, and how the JFrog Security research team unveiled them.

If you missed the first blog, here are some key takeaways:
• Third-party software packages contain vulnerabilities or malicious code delivered through the sof

Malicious packages: security threats in your software supply chain

Welcome to the first post in the malicious software packages series for the DevOps and DevSecOps community. This technical series will focus on various malicious packages and their effects on the software supply chain.

We’ll dive deeper into malicious packages in each post, including
• None Defining software supply chain attacks and learning the critical role that malicious software packages play in them (you’re here)
• None that attackers use to spread malicious software packages with examples

Long aftermath of a mass shooting: Remembering my father, killed in 1991 at the University of Iowa

My father and I were very close: we shared the same birthday and people said I took after him. He was a role model, confidant and mentor who supported and challenged me, talking me through problems and piercing through any of my self-deceptions with scientific precision. Even after leaving home for college, I would consult him on personal matters and his brutally honest opinion generally guided my decisions. After his death I realized to what extent I had depended on his sage advice. It took me

Travel Impressions Offers Web Access to Customer Care Group

Travel Impressions has added web access to its Customer Care Group, which
allows travel agents to submit post-travel communications to Travel Impressions
on behalf of their clients via their web si | Travel Impressions has added web access to its Customer Care Group, which allows travel agents to submit post-travel communications to Travel Impressions on behalf of their clients via their web site.

The secrets to fostering a people-focused call center

Since January 2019, 3.5 million employees (about twice the population of Nebraska) have left their jobs voluntarily, according to the U.S. Bureau of Labor Statistics, costing companies millions of dollars. Employees of call centers are no exception.

Call center attrition is a very real industry pain point. According to Quality Assurance and Training Connection, turnover in the call center industry averages between 30% and 45%. And when an agent leaves, so does their wealth of industry knowledge.
Load More

Follow Me