Software innovation and delivery are on the top of just about any forward-thinking executive’s priority list these days, and businesses are doubling down on software optimization development efforts.
Value stream management (VSM)—a lean business practice that allows for visibility over how software is being built—has grown in popularity in DevOps circles as a result. As units of function pass along the pipeline, from concept to deployment, managers can benefit from understanding how this is taking place, from speed of development, to where the bottlenecks are, to what value is being delivered.
GigaOm analyst Jon Collins examines the “why” of VSM in a recent blog post. One of those “whys” is the question “why now?” People have been building applications for a long time, after all, and should already know how to manage the process. But VSM has cropped up as a response … Read More »
Figure 1. GigaOm Radar for Evaluating Performance Testing Tools
As we noted in a previous article, the market for performance testing tools is heating up. Why? Because performance testing—which is a process that tests software applications under particular loads and provides feedback—is now seen as an integral element of a quality-first approach in cloud-native environments. Performance testing is necessary to give management and development staff information on the quality of performance of an IT business solution.
Another influencing factor in the growth of performance testing is the move to shift left in DevOps. Testing can kill innovation and increase the complexity of delivering solutions. So if a test tool is difficult to use, it can become a bottleneck due to the limited number of available skilled testers. And this can mean that teams either skip performance tests or accept a reduction in … Read More »
No organization wants its name in the headlines because of a security incident or data breach, but major security incidents occur globally on a near-daily basis. The threat landscape is daunting. Industrious criminals know how to exploit software vulnerabilities and are always evolving techniques to take advantage of security gaps.
Vulnerability management tools are part of a larger arsenal to help organizations in the fight against cybercrime. They assist with creating airtight applications and systems early in the software development lifecycle. They enable the identification, classification, prioritization, and remediation of threats.
In the recently released Key Criteria Report for Evaluating Vulnerability Management Tools, Iben Rodriguez and Geoff Uyleman dive in to vulnerability management tools and discover that as the market matures, security products are adding more capabilities and there is an increasing overlap that blurs the lines of traditional product categories.
“Vulnerability management … Read More »
NoSQL databases store data differently than relational databases and come in several different “types” based on their data model. Because of the massive demand for data at almost all companies, NoSQL databases have seen robust growth in the past several years, and some estimates predict that the global NoSQL market will grow as much as 30% through 2025.
But the unexposed costs of NoSQL database ownership could create an unsustainable burden for many organizations. To help IT decision-makers understand the problem, GigaOm Analysts William McKnight and Jake Dolezal have published a new report, Cassandra Total Cost of Ownership Study, which examines the full costs and true value of the popular Cassandra NoSQL database self-managed on Google Cloud and the fully-managed DataStax Astra serverless Cassandra offering.
The final three-year Total Cost of Ownership (TCO) finds the cost of serverless Cassandra to be $740,087, … Read More »
If you’re like me and have been around the block in tech more than once, you’ve seen three-letter acronyms come and go. Sometimes the technology they refer to is a flash in the pan; other times it hangs around for a bit before being subsumed into the platforms we build upon.
And so it is with value stream management (VSM), which has grown in popularity in DevOps circles. The first question I tend to ask about this is, why? Is this some new innovation that needs a name, or has someone spotted a weakness in existing tools and methods?
In a nutshell, VSM refers to the need—or the ability—to have visibility over how software is being built. As units of function pass along the pipeline, from concept to deployment, managers can benefit from understanding how this is taking place, from speed of … Read More »
The number of businesses migrating to the cloud is constantly growing. Hybrid cloud is now considered a standard approach by organizations of all sizes, and many expect to move to multi-cloud in the future. But this growth is not without significant challenges. As more companies adopt cloud technology, challenges like exponential data growth, disparate data types, new security threats, and data management and reusability all make data protection more difficult and more critical than before.
In the newest version of his research, Key Criteria for Evaluating Hybrid Cloud Data Protection, GigaOm Analyst Enrico Signoretti says the sector has changed since his first evaluation in 2019—namely because users are more interested in security than ever before. And they are eager for products that can secure their data against an escalating threat landscape that includes ransomware exploits, just one of the many types … Read More »