Editorial Calendar
4 Reasons to Shift Day 2 Operations Left With Kubernetes
Rapid application growth and increased production deployments at scale have pushed many enterprises to maintain a focus not just on the application development life cycle but also on ‘Day 2’ operations and ...
Could Nomad Reignite Orchestrator Wars?
Most technology pundits agree that Kubernetes won the container orchestration wars, triumphing over alternatives like Docker Swarm and Mesos. Google even showcases a featured snippet for the exact moment of victory—November 29, ...
Majority of Microservices Environments Adopt Service Mesh
In the past, we’ve reviewed the efficacy of service mesh and considered whether it’s mature enough for adoption. Others have suggested using service mesh to control both east-west and north-south traffic. Now, ...
Upbound Advances Crossplane Control Plane for Hybrid IT Environments
Upbound has made generally available an Upbound Cloud service through which IT teams can manage clusters running a curated distribution of Crossplane, an open source control plane being advanced under the auspices ...
Seven Step Transformation Blueprint for Containers
This blog explains how to apply my Seven-Step Transformation Blueprint to containers. Digital transformations are hard. Many organizations falter while trying to transform their people, practices and technologies to meet strategic objectives. ...
Enterprise Container Platforms Optimize Operations
As I indicated in my prior blog, A New Approach to K8s and Containers, a new kind of enterprise Kubernetes-based container platform is needed to accelerate time-to-value and realize efficient, safe operation ...
Taking Cloud-Native Security to the Next Level
It’s no secret that containers and Kubernetes offer unparalleled speed and agility. As organizations look to the technology for the ability to scale and deliver modern applications, Gartner predicts containers will be ...
A New Approach to K8s and Containers
Kubernetes is the linchpin of the enterprise container platform and central to the digital transformation strategies of many enterprises. It is the de facto standard for addressing and automating modern applications in ...
How Kubernetes Protects Enterprises From Ransomware
Today’s complex enterprise IT workloads require the scale and flexibility that only Kubernetes can deliver. But security issues facing Kubernetes users continue to disrupt critical operations, particularly as ransomware inflicts increasing damage ...
15 Point Kubernetes Security Checklist
Thoroughly securing containers and Kubernetes environments – especially in production where they’re most vulnerable – requires a layered security strategy with consistent vigilance across multiple fronts. Kubernetes itself has become an increasingly ...

