Docker was voted one of the most popular open source projects in a survey conducted by The New Stack and The Linux Foundation during July 2014. This ever growing popularity of Docker???s container technology has brought over 14,000 different images to be offered on Docker Hub in September 2014. As a commercial feature, Docker private registries can provide enterprises with access control to their internal images. However, JFrog has recognized that enterprises may not be satisfied with the security that can be offered by images stored in the cloud.
Authentication is the basic requirement for most of websites. However, there are many mechanisms to implement authentication and they are not very interchangeable. Depend on business requirement, developers need to choose the most appropriate method of authentication for their application. It may not be an easy task unless one understand the differences among mechanisms well.
In this short article, I would like to recap 4 popular mechanisms for implementing authentication. There will be comparison and consideration to choose the most appropriate method as well.
Log data provides the most granular view into what is happening across your systems, applications, and end users. Logs can show you where the issues are in real-time, and provide a historical trending view over time. Logs give you the whole picture.
HTML5 has introduced a lot of changes welcomed by developers, including adding additional types of form input elements that helps in form processing activities like validation. Validating web forms has always been a painful task for many developers. Performing client side validation in a user-friendly as well as developer-friendly way is really hard. Furthermore informing users about the validation error in a pleasant way is a tedious task.
The latest survey from DZ Research is live, and it's all about performance and monitoring. Remember the days of #MonitoringSucks? Well now it's time to see if it still sucks.See what I mean: Check out the Survey As with all of our surveys, the questions are super-intriguing and you are entered to win a Nexus Tab, iPad Air, or MS Surface when you take it.When it's all said and done,...
There, that was an interesting post. Short, but interesting.
Maybe I should explain that most insightful conclusion a little bit.
Again.., a dear (anonymous) friend told me a great story about what happened at work. This time around it was a bit darker than usual. This time there were victims. This time people got sacked, fired, let go, made redundant. Come in to work in the morning,...
Make sure you didn't miss anything with this list of the Best of the Week in the Performance Zone (March 20 - March 27). Here they are, in order of popularity:
Make sure you didn't miss anything with this list of the Best of the Week in the Performance Zone (March 20 - March 27). This week includes info on TempDB...
I'm enjoying working with hubot; I have a few different instances running for different groups. One of the things that I use hubot for is to echo activities from the source control repo, the bug tracker, the CI system, the (you get the idea) into the channel for a project. This is achieved via webhooks; a feature offered by many providers to POST information about an event to your endpoint as...