#NoDrama DevOps
By QualiMente
Continuous Delivery with Serverless, CircleCI, and Lambda: The Good, Bad, and the YAML
Our Serverless continuous delivery pipeline lets us achieve Elite levels of Software Delivery Performance.
Minimize your delivery pipeline and platform dependencies
To escape The DevOps Organization Build Trap, I suggested that you minimize the distinct sets of components your organization uses to deliver and operate software. Those components represent a dependency tree and are integrated, enhanced, and worked-around by your...
Help for your Agile or DevOps Resolutions
Fireworks by Roven Images Happy New Year! Many of you have freshly resolved to be more agile, adopt DevOps, or ramp-up your software delivery improvement efforts. The NoDrama Agile and DevOps theme page will help you accomplish these resolutions by: building a solid...
Key practices for achieving large professional goals
My hope is that this post will help you reach your own goals in 2020. I attained several long-term professional goals in 2019 and I'd like to share the key practices for how I did that to help you along your way. We'll return to Cloud, Security, and DevOps topics in...
How technical do you need to be to set strategy for a technical organization?
'Solo' by NASA Joe Contrera is a leadership coach friend of mine and we just had a lively discussion about why so many strategic technology decisions look bad in hindsight and organizational transformations fail. He asked a great question: How technical do you need to...
SPIFFE Service Meshes that manage application identity and access control
This post on service meshes and SPIFFE will wrap up the series on how application identity and access control is migrating from implicit identification by IP address to application-level authorization. Let's start with an identity management technology that you may or...
Cloud native application-level identity and access control
The proper way to provide identities to applications on Cloud and container platforms is for the compute platform to provide that identity to the application instance . I call this the Cloud native application identity. Once the application has received its identity...
Better Network-based Identity and Access Control in the Cloud
This is the second post in a series about how the Cloud is changing how we manage network access control and application identity. In particular, my thesis is that the use of a network-centric identity such as an IP address or subnet to identify an application is...
Themes: Cloud Security and Containers
#NoDrama DevOps now has over 100 posts covering Cloud, DevOps, Security, Automation, AWS, and more. Cloud Security and Containers are two of the main themes I've written about this year. I've curated a guide to each of these themes in a new 'Knowledge Base' section of...
About #NoDrama
Learn how to design, build, and operate systems in the Cloud one day and concept at a time. A few times a week, Stephen Kuenzli will share his thoughts on building robust systems, architecting for and migrating to AWS, and using DevOps and engineering practices to manage complexity and deliver safely.
Our Newsletter
