latest news



DZone.com Feed

Securing Cloud Workloads in the Age of AI (Wed, 10 Dec 2025)
With the growth of cloud technologies dominating news headlines worldwide, it is no understatement to say that the rapid expansion of cloud and infrastructure technology has reached truly unprecedented levels. Cloud has evolved into the backbone of modern digital operations — highly scalable, globally distributed, and capable of powering everything from consumer applications to mission-critical enterprise workloads. As a broad range of industries adopt cloud computing at record speed, a new and rapidly emerging force is simultaneously reshaping the cybersecurity landscape: Artificial Intelligence (AI).  AI is revolutionizing automation, efficiency, and decision-making, but it is also equipping attackers with new, highly sophisticated tools that place cloud systems under constant threat. Threat actors now use AI to automate reconnaissance, craft targeted exploits, evade detection, and manipulate cloud configurations. This ultimately means that securing cloud workloads is no longer merely a best practice — it has become a foundational operational requirement. In this article, we explore key strategies organizations can adopt to protect their cloud environments from emerging AI-driven threats.
>> Read More

How Migrating to Hardened Container Images Strengthens the Secure Software Development Lifecycle (Wed, 10 Dec 2025)
Container images are the key components of the software supply chain. If they are vulnerable, the whole chain is at risk. This is why container image security should be at the core of any Secure Software Development Lifecycle (SSDLC) program. The problem is that studies show most vulnerabilities originate in the base image, not the application code. And yet, many teams still build their containers on top of random base images, undermining the security practices they already have in place. The result is hundreds of CVEs in security scans, failed audits, delayed deployments, and reactive firefighting instead of a clear vulnerability-management process.
>> Read More

Architecting Intelligence: A Complete LLM-Powered Pipeline for Unstructured Document Analytics (Wed, 10 Dec 2025)
Unstructured documents remain one of the most difficult sources of truth for enterprises to operationalize. Whether it's compliance teams flooded with scanned contracts, engineering departments dealing with decades of legacy PDFs, or operations teams handling invoices and reports from heterogeneous systems, organizations continue to struggle with making these documents searchable, analyzable, and reliable. Traditional OCR workflows and keyword search engines were never built to interpret context, identify risk, or extract meaning. The emergence of LLMs, multimodal OCR engines, and vector databases has finally created a practical path toward intelligent end-to-end document understanding, moving beyond raw extraction into actual reasoning and insight generation. In this article, I outline a modern, production-ready unstructured document analytics process, built from real-world deployment across compliance, tax, operations, and engineering functions. The Challenge of Heterogeneous Document Ecosystems Unstructured documents introduce complexity long before the first line of text is extracted. A single enterprise repository can contain digital PDFs, scanned images, email attachments, handwritten notes, multi-column layouts, or low-resolution files produced by outdated hardware. Each format demands a different extraction strategy, and treating them uniformly invites failure. OCR engines misinterpret characters, tables become distorted, numerical formats drift, and crucial metadata is lost in translation.
>> Read More

Breaking Into Architecture: What Engineers Need to Know (Wed, 10 Dec 2025)
You’ve been a developer or an engineer for a while now, and you know each module of your codebase inside out. You’ve solved every kind of pesky bug. But lately, you’ve been feeling that something is missing: the bigger picture that lies beyond the world of your module. In this article, we explore exactly those next steps: how an engineer grows into an architect, the different types of architect roles and their areas of focus, and finally, the skills or certifications that could propel you forward in that direction, with intent. 
>> Read More


DevOps Cafe Podcast

DevOps Cafe Ep 79 - Guests: Joseph Jacks and Ben Kehoe (Mon, 13 Aug 2018)
Triggered by Google Next 2018, John and Damon chat with Joseph Jacks (stealth startup) and Ben Kehoe (iRobot) about their public disagreements — and agreements — about Kubernetes and Serverless. 
>> Read More

DevOps Cafe Ep 78 - Guest: J. Paul Reed (Mon, 23 Jul 2018)
John and Damon chat with J.Paul Reed (Release Engineering Approaches) about the field of Systems Safety and Human Factors that studies why accidents happen and how to minimize the occurrence and impact. Show notes at http://devopscafe.org
>> Read More

DevOps Cafe Ep. 77 - Damon interviews John (Wed, 20 Jun 2018)
A new season of DevOps Cafe is here. The topic of this episode is "DevSecOps." Damon interviews John about what this term means, why it matters now, and the overall state of security.  Show notes at http://devopscafe.org
>> Read More