Gilad David Maayan is a technology writer who has worked with over 150 technology companies including SAP, Samsung NEXT, NetApp and Imperva, producing technical and thought leadership content that elucidates technical solutions for developers and IT leadership.

Best of 2022: Deploying Angular Apps to a Kubernetes Cluster
As we close out 2022, we at Container Journal wanted to highlight the most popular articles of the year. Following is the latest in our series of the Best of 2022. Angular ...

5 Kubernetes Pain Points and How to Solve Them
Kubernetes is an open source orchestration platform for managing Linux containers in private, public and hybrid cloud environments. It is also commonly used to manage a microservices architecture. Containers and Kubernetes can ...

Kubernetes Security in Your CI/CD Pipeline
Kubernetes security involves implementing security measures and tools and adopting best practices for protecting Kubernetes workloads. Kubernetes is an open source container management platform across public, private and hybrid clouds. Organizations employ ...

Common Istio Errors and How to Solve Them
Istio is an open source service mesh technology that lets you connect, secure, control, monitor and run microservices. Istio is compatible with microservices running on either containers or virtual machines (VMs) running ...

Migrating Existing Apps to Azure Kubernetes Service
AKS is a managed service that simplifies Kubernetes deployment and management of containerized applications in Azure. It eliminates much of the complexity and overhead associated with running your own Kubernetes clusters. AKS ...

Software Dependencies and Containerized Applications
Modern software projects (cloud-native applications built using microservices and containers and running on platforms like Kubernetes) use code written by other developers, whether they are third-party vendors or open source contributors. However, ...

Securing Containers With Zero-Trust Tools
As container environments grow in complexity, container security requires a different security approach. Container security must consider everything from the applications running in containers to the infrastructure on which those containers run. ...

Kubernetes Cheat Sheet: 8 Commands You Can’t Do Without
Kubernetes is a container orchestrator consisting of master and worker nodes. It allows communication only through an API server, which serves as the core component of the control plane. The API server ...

Endpoint Protection for Cloud-Native Workloads
Endpoint protection is the practice of deploying security systems on endpoints such as servers, workstations and mobile devices used to connect to corporate networks. The purpose of these systems is to detect, ...

The Basics of Serverless User Authentication
Serverless is growing in popularity, with Amazon Lambda dominating the industry as a serverless runtime. While serverless has many advantages, it also raises a variety of challenges and forces developers to do ...