Friday, May 15, 2026
Cloud Native Now

Cloud Native Now


MENUMENU
  • Home
  • Webinars
    • Upcoming
    • Calendar View
    • On-Demand
  • Podcasts
    • Cloud Native Now Podcast
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
  • About
  • Sponsor
MENUMENU
  • News
    • Latest News
    • News Releases
  • Cloud-Native Development
  • Cloud-Native Platforms
  • Cloud-Native Networking
  • Cloud-Native Security

Flynn is a technology evangelist at Buoyant, working on spreading the good word about Linkerd - the graduated CNCF service mesh that makes the fundamental tools for software security and reliability freely available to every engineer - and about Kubernetes and cloud-native development in general. Flynn is also the original author and a maintainer of the Emissary-ingress API gateway, also a CNCF project.

Cost-Effective Reliability: Making Sense of Multi-Zone Kubernetes

Cost-Effective Reliability: Making Sense of Multi-Zone Kubernetes

Look around the ‘net and you’re likely to see Kubernetes operators worrying about how to keep their applications up even in the face of failures but also worrying about the cost of ...
Flynn | September 26, 2025 | clusters, data centers, kubernetes, Routing, service meshes
Sidecars or Sharing: A Practical Guide to Selecting Your Service Mesh

Sidecars or Sharing: A Practical Guide to Selecting Your Service Mesh

Over the last year or so, we’ve seen a lot of confusion about “sidecars or sidecarless” in the context of service meshes. This architectural choice turns out to be very important – ...
Flynn | August 8, 2025 | kubernetes, Linkerd, service mesh, sidecars
cloud native open source Red Hat OpenShift edge Tanzu Docker Kubernetes

The Hidden Costs of Cloud-Native Open Source

Optimal open source use in the cloud-native stack means planning for the tradeoff expenses that can crop up ...
Flynn | January 22, 2024 | cloud-native development, cncf, kubernetes, Linkerd, open source, open source tools
zero-trust service mesh Korifi VMware kubernetes HyTrust Extends Compliance Platform

Zero-Trust Kubernetes and the Service Mesh

If you’re doing security in Kubernetes, chances are good that you’ve at least heard of zero-trust. You’ve probably been asked to deploy it or at least to think about how to deploy ...
Flynn | April 26, 2023 | Buoyant, cloud native security, kubernetes, networking, service mesh, zero-trust

Techstrong TV

Click full-screen to enable volume control
Watch latest episodes and shows

Tech Field Day Events

UPCOMING WEBINARS

  • CloudNativeNow.com
  • DevOps.com
  • SecurityBoulevard.com
From Experimentation to Production: Why Inference Is the Defining Layer of AI
4 June 2026
From Experimentation to Production: Why Inference Is the Defining Layer of AI
From Weeks to Minutes: A Practical Blueprint for Simplified Data Integration and Access
28 May 2026
From Weeks to Minutes: A Practical Blueprint for Simplified Data Integration and Access
The AI Reality Check – Operationalizing for Business Value
27 May 2026
The AI Reality Check – Operationalizing for Business Value
Beyond Embedded! RISC-V in the Performance CPU segment
27 May 2026
35 Million Lines, Zero Build-Breakers: How Adyen Scaled DevSecOps
23 June 2026
35 Million Lines, Zero Build-Breakers: How Adyen Scaled DevSecOps
How to Conduct AI-Native Bug Discovery & Triage
18 June 2026
How to Conduct AI-Native Bug Discovery & Triage
Toxic Flows: When Your Agent Skill Becomes a Supply Chain Attack
18 June 2026
Toxic Flows: When Your Agent Skill Becomes a Supply Chain Attack

Podcast


Listen to all of our podcasts

Press Releases

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

Deloitte Partners with Memcyco to Combat ATO and Other Online Attacks with Real-Time Digital Impersonation Protection Solutions

Deloitte Partners with Memcyco to Combat ATO and Other Online Attacks with Real-Time Digital Impersonation Protection Solutions

SUBSCRIBE TO CNN NEWSLETTER

MOST READ

Kubernetes v1.36 Promotes Stability, Compatibility & Reproducibility

April 22, 2026

Report: Utilization of Kubernetes Infrastructure Remains Abysmal

April 21, 2026

AWS Drives Kubernetes Simplification With EKS Hybrid Nodes Gateway

May 4, 2026

Solo.io Extends kagent Runtime to NemoClaw Governance Framework for AI Agents

May 8, 2026

Trilio Extends Disaster Recovery Reach to Red Hat OpenShift Virtualization

May 7, 2026

RECENT POSTS

The Inference Bottleneck: Architecting Kubernetes Autoscaling for Production LLMs 
Contributed Content Kubernetes Social - Facebook Social - LinkedIn Social - X Topics 

The Inference Bottleneck: Architecting Kubernetes Autoscaling for Production LLMs 

May 15, 2026 Pavan Madduri 0
Red Hat Expands OpenShift Application Development Environment
Cloud-Native Platforms Container/Kubernetes Management Features Kubernetes Kubernetes in the Enterprise News Social - Facebook Social - LinkedIn Social - X Virtualization 

Red Hat Expands OpenShift Application Development Environment

May 14, 2026 Mike Vizard 0
Why Observability is Critical for Modern Cloud‑Native Systems
Cloud-Native Architecture Cloud-Native Development Contributed Content Observability Social - Facebook Social - LinkedIn Social - X Topics 

Why Observability is Critical for Modern Cloud‑Native Systems

May 14, 2026 Johnbosco Ejiofor 0
Designing Cloud-Native Performance Management Platforms That Scale Across the Enterprise 
Cloud-Native Development Contributed Content Social - Facebook Social - LinkedIn Social - X Topics 

Designing Cloud-Native Performance Management Platforms That Scale Across the Enterprise 

May 14, 2026 Scott Werstlein 0
How Cloud‑Native DevOps is Accelerating Software Delivery 
Cloud-Native Development Contributed Content Social - Facebook Social - LinkedIn Social - X Topics 

How Cloud‑Native DevOps is Accelerating Software Delivery 

May 14, 2026 Johnbosco Ejiofor 0
  • About
  • Media Kit
  • Sponsor Info
  • Write for Cloud Native Now
  • Copyright
  • TOS
  • Privacy Policy
Powered by Techstrong Group
Copyright © 2026 Techstrong Group, Inc. All rights reserved.
×

Executive Security Survey

1
2
3
4
5
6
7
8

×