Deploying apps still somehow feels like a half-solved problem, but maybe there's hope on the horizon.
Blacksmith is now SOC 2 Type 2 compliant, underscoring our commitment to top-tier security practices. Learn about our latest steps to safeguard your data, including pentests, disaster recovery plans, and JIT tokens with Firecracker VMs.
Everyone is stacking their diffs these days. Read about why there is a sudden up-tick in adoption of this workflow, and how this can actually start costing your organization a lot more...unless you implement some checks and balances.
Matrix builds are a great way to improve the readability and efficiency of your CI pipelines. Click through to read more about the various ways in which you can leverage them.
In part 2 of our deep-dive into Docker, we focus on securing your Docker environments, and setting up basic observability for when things go wrong. Use this guide to help you setup TLS for secure communication between the Docker client and server. Learn how to surface important metrics about your Docker usage via Prometheus and Grafana!
Part 1 of our Docker deep dive explores the core architecture, including key components like the Docker Client, Daemon, and Registry. Uncover the processes behind image management, networking, and persistent storage. This guide lays the foundation for understanding and optimizing your Docker deployments.