Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

Simultaneous multi-cloud deployment to AWS and GCP with CircleCI

AWS recently experienced a significant outage. The outage took down major services, including parts of McDonald’s mobile ordering system, some Netflix features, and many other applications that relied solely on AWS infrastructure. This event perfectly illustrates why relying on just one cloud platform can be risky.

Self-Driving Data Highways: Realizing the Strategic Advantages of Autonomous IP Optical Networks at OFC26

In the telecom industry, leaders are under pressure to deliver more—more capacity, more agility, more reliability—while managing rising complexity with fewer resources. The network is the circulatory system of the modern telco, yet it’s still often operated like a patchwork of manual roads, each requiring constant human intervention. This model worked when traffic was predictable and growth was linear.

The Need for Clean in the AI Era

In the AI era, software and new models are being born at a breakneck pace—but they’re also bringing a lot of “baggage” into the world. While AI coding agents are busy accelerating innovation, they’re also excellent at generating a massive byproduct: “digital dust.” Between obsolete releases, orphaned dependencies, and massive model versions, your repository may soon start to look more like a digital junk drawer than a streamlined machine.

Getting started with Amazon Q Developer and CircleCI

AI coding assistants like Amazon Q Developer are transforming how you write software. They can generate entire functions, explain complex code, and help you move faster than ever. But there’s a catch: AI-generated code isn’t always correct. It can introduce subtle bugs, security vulnerabilities, or break existing functionality in ways that aren’t immediately obvious. That’s where continuous integration comes in.

Database Security Failures Don't Start in Security Teams

When a database security incident happens, everyone turns to the security team. We look for a simple root cause analysis, and then we add a control, tighten a policy, and maybe even buy a silver bullet tool. We feel progress! But the incident didn’t start there. It started years earlier, when the organization made a series of perfectly reasonable decisions that quietly expanded the surface area and weakened the consistency of control.