Supply chains need to securely distribute artifacts from a source to one or more destinations. Assuring the integrity is signed, sealed and delivered is a key capability.
Author: Steve Lasker
When describing mitigations to supply chain security incidents, it helps to categorize how different incidents may be initiated. Based on the category, different mitigation strategies are more likely to be effective.
As cloud-native development continues to automate the consumption of upstream content providers, the ability for automation to make […]
Adopting cloud-native development has become synonymous with consuming public content. To be productive, and not “reinvent the wheel”, […]
In this article I’ll offer a view for why any single new package manager isn’t a great idea, […]
Engaging customers at scale is just as difficult as building services that scale
I trust our democratic process to do the right thing for the US election, and I believe we deserve the outcome of our democratic process. But, what should we take away from the election in our day to day lives?
Every long journey begins with the first step.
Developers are increasingly contributing to and consuming more upstream content. However, as every community effort has proven, risks […]
As we embarked on Notary v2, we needed to incorporate experts from multiple backgrounds, experiences and skillsets. The […]