Wednesday, May 31, 2017

Word of the Day: DevOps

Word of the Day WhatIs.com
Daily updates on the latest technology terms |May 31, 2017
DevOps

DevOps is the blending of tasks performed by a company's application development and systems operations teams.

Visit our newest sister site, DevOpsAgenda.com, to learn more about DevOps!

 

The DevOps approach seeks to meld application development and deployment into a more streamlined process, shifting some of the operation team's responsibilities back to the development team in order to facilitate continuous development, continuous integration, continuous delivery and continuous monitoring processes.

 

The necessity for tearing down the silos between development and operations has been expedited by the need to release code faster and more often in order to help the organization respond in a more agile manner to changing business requirements. Other drivers for breaking down the silos include the increasing use of cloud computing and advances in software-defined infrastructures, microservices, containers and automation.

 

In its most broad meaning, DevOps describes a culture that promotes better communication between development and operations as more elements of operations become programmable. In its most narrow interpretation, DevOps describes the part of an organization's information technology (IT) team that creates and maintains infrastructure.

New software tools have sprung up to help organizations automate testing and create a more streamlined development and release pipeline. Such tools include GitHub for storing code, Puppet and Chef for configuration management, Nagios for monitoring how changes to code affect the environment and Splunk for operational intelligence.

Although marketers have jumped on the DevOps bandwagon, there is really no such thing as a "DevOps product." There is only software that will help the development and operations team work together more efficiently and respond to changing requirements more flexibly.

Quote of the Day

"You'll need leadership for DevOps to really work. Thankfully, because DevOps will improve the speed and quality of production and cut costs, your boss should be on board." - Chris Tozzi

 

Trending Terms

quality assurance
continuous software development
BizDevOps
DevOps certification
DevOps as a Service
configuration management

 
Learning Center

High-level DevOps leaders needed for DevOps to take root
Yes, DevOps needs grassroots support. But for it to succeed, high-level DevOps leaders must also get involved to push the culture change.

DevOps automation remains a high hurdle for DevOps culture
DevOps and automation experts weigh in on the discrepancy between DevOps culture and the nuts and bolts automated testing adoption.

What does soft-ripening French cheese have to do with DevOps QA?
What does soft-ripening French cheese have to do with DevOps? Well, even in a world of automation, QA will always need a little bit of that human touch.

DevOps vs. NoOps: Will automation give Ops the proverbial boot?
As more and more enterprises adopt and use automation in continuous development, NoOps, DevOps without the operations side, seems possible.

Doing DevOps? Turn your boss into a DevOps leader first
If you want to implement DevOps principles in your organization, you'll need to engage executive and manager-level support. You'll need DevOps leaders.

Writing for Business

Successfully _______ a DevOps culture in a data center isn't easy, but it brings great rewards.
A. adapting
B. adopting
Answer

 

 

 

Stay In Touch
For feedback about any of our definitions or to suggest a new definition, please contact me at: mrouse@techtarget.com

 

Visit the Word of the Day Archives and catch up on what you've missed!

 

FOLLOW US

TwitterRSS
About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Whatis.com, click here. Please note, this will not affect any other subscriptions you have signed up for.
TechTarget

TechTarget, Whatis, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2016 TechTarget. All rights reserved.

VMware introduces IoT infrastructure management solution ? VMware Pulse IoT Center

 
 
 
VMware introduces IoT infrastructure management solution ? VMware Pulse IoT Center
The Internet of Things (IoT) is exposing us to new types of data, information that we were simply unable to attain before. To take advantage of what may well be the next industrial revolution, both your IT and OT teams need complete control over their IoT use cases.

With no degree of uncertainty, you need to manage, monitor, and secure the entirety of your IoT on-premise or in the cloud. Watch this webcast to learn how to:
  • Simplify IoT complexity
  • Improve the reliability and security of your IoT infrastructure
  • And accelerate the ROI of your IoT use case
Sponsored by: VMware
VIEW NOW
ABOUT THIS E-NEWSLETTER

This email is published by the TechTarget CIO Media Group.

Copyright 2017 TechTarget, Inc. All rights reserved. Designated trademarks and brands are the property of their respective owners.

To unsubscribe from all TechTarget Business Applications and Architecture Media Group,
Go to unsubscribe.

TechTarget Business Applications and Architecture Media Group, 275 Grove Street, Newton, MA 02466
Contact: webmaster@techtarget.com

When you access content from this newsletter, your information may be shared with the sponsors of that content as described in our Privacy Policy.
VIEW NOW
SPONSORED BY VMware

The Weather Company gets personal; Salesforce amps up e-commerce strategy

Salesforce CRM Digest
A roundup of business applications content from TechTarget's network | May 31, 2017
TechTarget
FEATURED STORY

Personalized marketing gets a step closer

with weather data

by Jesse Scardina, News Writer

By partnering with multiple data monetization companies, The Weather Company is providing more data points to marketers and advertisers.
(SearchCRM.com)

Advertisement
NEWS
 

Salesforce e-commerce tools build better customer strategies

This handbook examines how successful customers are using various marketing and transactional data tools to drive revenue and build an effective e-commerce strategy.
(SearchSalesforce.com)

 

Salesforce goes from B2B to

B2C thanks to Demandware

Amid a flurry of acquisitions, Salesforce signaled its intention to expand customer management into retail, where enhanced e-commerce functionality can strengthen service.
(SearchSalesforce.com)

EXPERT ADVICE
 

The case for code in the Salesforce certification

The Salesforce developer certification measures click skills or code skills. Here is a guide to knowing the code skills necessary to pass the Force.com Developer certification.
(SearchSalesforce.com)

 

CRM is the latest beneficiary

of blockchain technology

Blockchain supports Bitcoin, but speculation has started about blockchain technology applications someday improving CRM due to their security strengths.
(SearchCRM.com)

About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Business Applications Digest, click here. Please note, this will not affect any other subscriptions you have signed up for.

TechTarget Enterprise Applications Media Group, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2016 TechTarget. All rights reserved.
TechTarget

Better firewall management and configuration auditing: Key benefits

 
Automate Zero Trust Policy and Enforcement
Sponsored by: FireMon
In October 2016, Forrester Consulting evaluated enterprise firewall management and configuration auditing approaches. Forrester found users of firewall auditing solutions are three to four times likelier than nonusers to address and implement firewall change requests within 24 hours.

Discover Forrester’s findings and uncover:
  • The importance of implementing firewall management
  • Key benefits of this technology
  • And more
VIEW NOW

ABOUT THIS EMAIL

This email is published by the TechTarget Security Media Group.

Copyright 2017 TechTarget, Inc. All rights reserved. Designated trademarks and brands are the property of their respective owners.

To unsubscribe from all TechTarget Security Media Group,
Go to unsubscribe.

TechTarget Security Media Group, 275 Grove Street, Newton, MA 02466
Contact: webmaster@techtarget.com

When you access content from this newsletter, your information may be shared with the sponsors of that content as described in our Privacy Policy.

The network manager’s guide to ransomware

 
The network manager’s guide to ransomware
Sponsored by: Cisco Umbrella
Ransomware is on a rapid and successful rise, and network managers need to be aware of how ransomware can attack their network in a very sophisticated and complex manner.

In this Network Manager’s guide to Ransomware, overcome your fears of ransomware by discovering:
  • How a typical infection occurs
  • A strong ransomware prevention strategy
  • How to protect your network infrastructure
VIEW NOW

ABOUT THIS EMAIL

This email is published by the TechTarget Networking Media Group.

Copyright 2015 TechTarget, Inc. All rights reserved. Designated trademarks and brands are the property of their respective owners.

To unsubscribe from all TechTarget Networking Media Group,
Go to unsubscribe.

TechTarget Networking Media Group, 275 Grove Street, Newton, MA 02466
Contact: webmaster@techtarget.com

When you access content from this newsletter, your information may be shared with the sponsors of that content as described in our Privacy Policy.

Ransomware: 6 recommendations to mitigate effectiveness

 
Ransomware: 6 recommendations to mitigate effectiveness
Sponsored by: CyberArk Software, Inc.
After analyzing and testing more than 157,000 samples of ransomware, CyberArk Labs found that an alternative methodology to protecting against ransomware can be effective.

The “greylist approach” to application control on endpoints can dramatically minimize the impact of ransomware. In the lab, this approach had:
  • 99.993% effectiveness on local administer user endpoints
  • 100% effectiveness in cases with users without local admin rights
In this white paper, discover how to apply a greylist approach to your ransomware prevention strategy, as well as 5 other recommendations.
VIEW NOW

ABOUT THIS EMAIL

This email is published by the TechTarget Security Media Group.

Copyright 2017 TechTarget, Inc. All rights reserved. Designated trademarks and brands are the property of their respective owners.

To unsubscribe from all TechTarget Security Media Group,
Go to unsubscribe.

TechTarget Security Media Group, 275 Grove Street, Newton, MA 02466
Contact: webmaster@techtarget.com

When you access content from this newsletter, your information may be shared with the sponsors of that content as described in our Privacy Policy.

The new digital playbook for IT execs; CIO influence expands

IT Strategy Digest
Content from TechTarget's global network for CIOs and IT Leaders |May 31, 2017
TechTarget
NEWS
MIT CIO Symposium 2017 elucidates the digital playbook
Linda Tucci, Senior Executive Editor
IT leaders speaking at the 2017 MIT Sloan Symposium revealed that a digital playbook is taking shape with elements that transcend industry, company size and age. (SearchCIO.com)
Advertisement
NEWS
 
IT startup companies seek product advice from CIOs
A number of the companies participating in the MIT CIO conference's Innovation Showcase can point to CIOs as important sources of technology direction and product evolution. (SearchCIO.com)
 
The Roomba is an early use case for cloud robotics
Read how iRobot is making a play for the smart home and is using cutting-edge cloud robotics technology to do so. (SearchCIO.com)
 
Not investing in cybersecurity has 'inverse ROI'
This month's WannaCry attack clearly shows the cost of skimping on cybersecurity. Unfortunately, the ROI for ample IT security is not as transparent for some companies, MIT's Michael Siegel explains. (SearchCIO.com)
 
The CIO's role in IT's digital transformation journey
Matt Griffiths, CIO at Stanley Black & Decker Industrial, offers advice on the mistakes that CIOs should avoid during their digital transformation journey. (SearchCIO.com)
EXPERT ADVICE
 
A CIO becomes a cloud enthusiast and outgrows his mentors
Want to get a sense of how much CIO roles and responsibilities have changed? Try explaining your cloud strategy to your IT mentors. (SearchCIO.com)
 
Don't let impostor syndrome hold you back
Lots of accomplished people feel like frauds -- and that can get in the way of success. Rackspace's Major Hayden shares his experience and the tools to move on. (SearchCIO.com)
 
Cyber czar says government will manage IT like an enterprise does
Trump administration "cyber czar" Rob Joyce outlined how the government plans to combat cybersecurity gaps at an event in Boston. (SearchCIO.com)
 
CIO doesn't play chief digital officer role at GE
The domain of the chief digital officer role should be commercial products, according to General Electric's IT chief, while the CIO keeps operations running smoothly. (SearchCIO.com)
About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from IT Strategy Digest, click here. Please note, this will not affect any other subscriptions you have signed up for.

TechTarget CIO and IT Management Media Group, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2017 TechTarget. All rights reserved.
TechTarget

Please respond David

David, I wanted to reach out to see if you'd be interested in completing our Virtualization Software Research Program.

In return, you'll receive our IT Purchase Priorities Report.  This free report covers your peers' virtualization software purchasing plans, key product features & growth areas for new technologies you need to invest more in this year.

Download my copy now.

Thank you,
Vanessa Anderson
TechTarget

____________________________________________________________________

ABOUT THIS EMAIL
Copyright 2017 TechTarget, Inc. All right reserved.
We protect your privacy. Designated trademarks and brands are the property of their respective owners.
If you prefer to no longer receive TechTarget Media Group Recommends emails, unsubscribe here.
© 2017 TechTarget
275 Grove Street
Newton, MA 02466
Contact:
webmaster@techtarget.com

3 strategies to align security and compliance

TechTarget
TechTarget
May 31, 2017
 
Business Technology Research from TechTarget
 
 
3 strategies to align security and compliance
Sponsored by SearchCIO.com
This SearchCompliance handbook explains why cooperation between compliance and security departments benefits the entire enterprise, and how these two groups can align their strategic objectives. Read more...
 
 
A powerful unified computing solution with 2 failover paths
Sponsored by Global Knowledge
This white paper discusses how Cisco's popular and powerful Unified Computing Solution is driven by the flexibility and agility of the hardware failover options and Service Profiles. Read more...
 
 
90% of organizations plan to use multiple clouds. How do you manage all of them?
Sponsored by Turbonomic
Multicloud management is a new technology enabling these businesses to manage their clouds from a single unified platform. This IDC report discusses the multicloud management innovations being made by one company, as well as the challenges they face. Read more...
 
 
Service provider's network architectures need to evolve now
Sponsored by Cisco Systems, Inc.
To keep up with digital transformation, service providers' network architectures must evolve.One new architecture many service providers are looking into employing is open network architecture. Learn more about open network architecture benefits and how to deploy it in this resource. Read more...
 
 
The impact of machine learning on analytics
Sponsored by SAS
This in-depth resource describes the opportunities machine learning affords to analytics strategies. Learn how to overcome common challenges of incorporating machine learning and how two organizations specifically are navigating modern analytics technology opportunities and pitfalls. Read more...
 

Don't miss your chance to participate David

Time is running out!

David,

We've been trying to get in touch with you over the past couple of weeks. We have launched our first Cloud Research Program of 2017 and we would really like you to participate! Over 200 of your peers have already taken advantage of the information you will receive at the end of this program. You will get 3 exclusive cloud research reports upon participation.

This information includes A comparison of Azure, AWS, and Google cloud services, To manage multiple clouds, look to automation & Want better cloud infrastructure management? Re-examine your IT tool set.

Time is running out for our research program - only 2 weeks left - and we really want to hear from you!

Start Survey

Best regards,
Olivia, TechTarget Peer Research Network

ABOUT THIS EMAIL

This email is published by the TechTarget.

To unsubscribe from all Media Group emails, go to unsubscribe.

Contact: webmaster@techtarget.com

When you access content from this newsletter, your information may be shared with the sponsors of that content as described in our Privacy Policy.

Copyright 2017 TechTarget, Inc. All rights reserved. Designated trademarks and brands are the property of their respective owners.

TechTarget
275 Grove Street
Newton, MA 02466

5 steps to getting into GDPR compliance

TechTarget
TechTarget
May 31, 2017
 
Business Technology Research from TechTarget
 
 
5 steps to getting into GDPR compliance
Sponsored by Commvault
In this IDC research report, learn the 5 steps you'll need to take to get your organization into compliance with the EU's General Data Protection Regulation (GDPR) by May 2018. Read more...
 
 
Learn the tools in the new IP Office Manager
Sponsored by Global Knowledge
Use this white paper to help you prepare to install and administer IP Office Manager 9.1. Read more...
 
 
The CIO guide to autonomic IT
Sponsored by Turbonomic
Download this white paper for tips on how to optimize your business through better and faster IT service delivery. You'll learn the five stages of IT maturity and how—no matter where an organization exists today—adopting an autonomic approach that allows workloads to self-manage on any infrastructure or cloud can help. Read more...
 
 
Open network architecture: The hottest trend for service providers
Sponsored by Cisco Systems, Inc.
Many service providers are implementing an open network architecture to help them meet the challenges presented by digital transformation. In this resource, learn the benefits of an open network architecture, and ,more importantly, how to deploy one at your business. Read more...
 
 
Anticipate new threats with data visualization
Sponsored by SAS
Data visualizations can help your organization tremendously when it comes to finding and eliminating cyberthreats deep within your organization. Discover how to not only detect and block attacks in minutes, but also get insight from these attack locations to better protect against emerging trends and anticipate signs of threats. Read more...
 

Surface Hub:Customer FAQs

Surface Hub:Customer FAQs
Sponsored by: TechData - Microsoft
If you’re like many of the customers considering a purchase of Microsoft’s Surface Hub you are likely riddled with questions about the product.

Learn the answers to the most common customer questions about Surface Hub in this resource, including:
  • What market will Surface Hub be released in?
  • What type of channel partners are selling Surface Hub?
  • How much will Surface Hub cost?
VIEW NOW

ABOUT THIS EMAIL

This email is published by the TechTarget Networking Media Group.

Copyright 2015 TechTarget, Inc. All rights reserved. Designated trademarks and brands are the property of their respective owners.

To unsubscribe from all TechTarget Networking Media Group,
Go to unsubscribe.

TechTarget Networking Media Group, 275 Grove Street, Newton, MA 02466
Contact: webmaster@techtarget.com

When you access content from this newsletter, your information may be shared with the sponsors of that content as described in our Privacy Policy.

How to design the most resilient architecture possible

How to design the most resilient architecture possible
Sponsored by: Rackspace
To have a truly resilient architecture in today's cloud environment, you must combine a hardware perspective, and an application (software or service) perspective. Architecture resiliency means better preparation for disasters and minimized business impact.

Access this white paper to learn about how to design the most resilient architecture possible to ensure your business' success. Read on to learn about:
  • Establishing an availability model and plan
  • Defining the business' tolerance for outage
  • Identifying failure points, failure modes and failure effects
  • And more
VIEW NOW

ABOUT THIS EMAIL

This email is published by the TechTarget Data Center and Virtualization Media Group.

Copyright 2016 TechTarget, Inc. All rights reserved. Designated trademarks and brands are the property of their respective owners.

To unsubscribe from all TechTarget Data Center and Virtualization Media Group,
Go to unsubscribe.

TechTarget Data Center and Virtualization Media Group, 275 Grove Street, Newton, MA 02466
Contact: webmaster@techtarget.com

When you access content from this newsletter, your information may be shared with the sponsors of that content as described in our Privacy Policy.

Endpoint security: Symantec vs. Kaspersky vs. McAfee vs. Trend Micro

 
Endpoint security: Symantec vs. Kaspersky vs. McAfee vs. Trend Micro
Sponsored by: Symantec & Blue Coat Systems
Endpoint security products have become a necessity in the dispersed enterprise. However, when choosing a solution, it’s critical to not only assess the security it provides, but the impact it will have on your end users.

This white paper presents the results of an independent test of endpoint security solutions against 17 performance metrics. Uncover how these 4 leaders in the market stack up against each other.
  • Symantec
  • Kaspersky
  • McAfee
  • Trend Micro
Get all the facts you need to determine 2017’s endpoint security market leaders—read on to learn more now.
VIEW NOW

ABOUT THIS EMAIL

This email is published by the TechTarget Networking Media Group.

Copyright 2015 TechTarget, Inc. All rights reserved. Designated trademarks and brands are the property of their respective owners.

To unsubscribe from all TechTarget Networking Media Group,
Go to unsubscribe.

TechTarget Networking Media Group, 275 Grove Street, Newton, MA 02466
Contact: webmaster@techtarget.com

When you access content from this newsletter, your information may be shared with the sponsors of that content as described in our Privacy Policy.

Cloud security: Why traditional approaches don't work

TechTarget
TechTarget
May 31, 2017
 
Business Technology Research from TechTarget
 
 
Cloud security: Why traditional approaches don't work
Sponsored by Peak10
The cloud doesn't have to be a security concern. This white paper dives into common security threats to the cloud and best practices on how to deal with them. Read more...
 
 
Enhance your machine-to-machine communications security with new IT strategies
Sponsored by Global Knowledge
In this informative resource, explore the unforeseen risks of M2M communication, the challenges of maintaining M2M security, and the possible solutions that exist to mitigate these risks. Read more...
 
 
Case study: Multinational leader implements self-managing infrastructure
Sponsored by Turbonomic
We all have to deal with market disruption and how you adapt determines whether you sink or swim. With today's markets, you need an infrastructure that enables you to respond to market demands as soon as possible. Access this case study to learn how and why one multinational company implemented a self-managing infrastructure. Read more...
 
 
Manage your data mining for better analytics
Sponsored by SearchBusinessAnalytics
Data science, predictive analytics and machine learning applications start with data collection and data mining tasks that set the stage for analysis. Learn how to manage your data mining tasks and data science applications to help ensure that your big data analytics program is in the corporate spotlight for all the right reasons. Read more...
 
 
Is your network cloud ready?
Sponsored by Cisco Systems, Inc.
The contents of this e-book explain how to get the network architecture you need for a cloud-centric world. Read more...