BlimpinThe StartupThe 3 Phases of Prezi’s Development Environment EvolutionUnlike production, development environments usually evolve ad-hoc. Teams are so busy deploying new features that they don’t have time to…6 min read·Oct 15, 2020----
BlimpA Brief Introduction to BlimpBlimp is a drop-in replacement for Docker Compose that runs your development environment on Kubernetes in the cloud. It’s backward…5 min read·Aug 27, 2020----
BlimpWhy Eventbrite runs a 700 node Kube cluster just for developmentIn Part 1 of this interview with Remy DeWolf, a principal engineer on the DevTools team at Eventbrite, we discussed what information…6 min read·Aug 27, 2020----
BlimpQ&A: How Eventbrite prioritizes developer productivityDeciding when to invest in developer productivity improvements is hard. If you’re on the ops side of things, you’re usually concerned…6 min read·Aug 13, 2020----
BlimpWhy DevOps Should be Responsible for Development EnvironmentsLet’s discuss an extremely common anti-pattern I’ve noticed with teams that are relatively new to containers/cloud-native/kubernetes, etc…5 min read·Aug 1, 2020----
BlimpinThe StartupHow We Cut Our Docker Push Time by 90%We set out to optimize the push process7 min read·Jul 23, 2020----
BlimpinThe StartupUsing Data Containers To Boot Your Development Environment In SecondsBuilding the nirvana of development environments: booting the environment with a single command that works every time.5 min read·Jul 9, 2020----
BlimpinThe StartupHow to Develop Your Python Docker Applications FasterDocker has many benefits that make deploying applications easier. But the process of developing Python with Docker can be frustratingly…5 min read·Jul 1, 2020----
Blimp5 Common Mistakes When Writing Docker ComposeDocker Compose is tricky. Learn some best practices for Docker Compose files to improve developer productivity.10 min read·Jun 24, 2020----
BlimpWhat a mysterious bug taught us about how Docker stores registry credentialsWhere are Docker credentials stored? Minimal setups may insecurely store credentials and result in security vulnerabilities.5 min read·Jun 23, 2020----