Contributed Content

Article #3: Buildpacks Optimization, Portability and Lifecycle
This article is the final one in a three-part series exploring how open-source Cloud Native Buildpacks and their ecosystem offer a compelling alternative to Docker for container image creation ...

Article #2: Dependency and Runtime Management
This article is the second in a three-part series, exploring how open-source Buildpacks and their ecosystem offer a compelling alternative to Docker for container image creation ...

Article #1: Uplevelling Your Container Lifecycle Management
This article is the first in a series of three exploring how open-source Buildpacks and their ecosystem offer a compelling alternative to Docker for container image creation ...

Deploy Serverless Lambdas Confidently with Canary
Exploring Lambda function releases using CD pipelines and canary deployments, comparing deployment strategies, detailing best practices and offering insights on making releases safer and faster. ...

Smarter Containers: How to Optimize Your Dockerfiles for Speed, Size and Security
Properly designed Dockerfiles can save construction time, enable the creation of smaller images and facilitate deployment ...

Serverless Computing: Unlocking the Potential for Scalable and Cost-Effective Solutions
Advance in serverless computing by focusing on organizing, versioning and automating functions while controlling costs. ...

Components of the Kubernetes Architecture
Kubernetes architecture, how it works and why it is considered the de facto platform for deploying and managing containerized applications. ...

PKI for Kubernetes: Are You Set Up for Security and Scale?
Deploying PKI often introduces hidden complexities. Platform engineers are faced with assorted options — built-in approaches, DIY PKI setups, open-source tools and other solutions ...

Beyond Size: Don’t Panic at the Distroless
The idea behind distroless is straightforward enough — take away everything unnecessary, leaving only the application and its absolute bare minimum runtime dependencies ...

Solving Container Security Challenges: Vulnerabilities, Shadow Deployments and Deployment Gaps
In containerized environments security risks can exist in three areas: Vulnerabilities in software, shadow containers and deployment problems ...