Saturday, January 24, 2026
Cloud Native Now

Cloud Native Now


MENUMENU
  • Home
  • Webinars
    • Upcoming
    • Calendar View
    • On-Demand
  • Podcasts
    • Cloud Native Now Podcast
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
  • About
  • Sponsor
MENUMENU
  • News
    • Latest News
    • News Releases
  • Cloud-Native Development
  • Cloud-Native Platforms
  • Cloud-Native Networking
  • Cloud-Native Security

Features

Kubernetes team KubeMaster cloud-native

Scaling Your Kubernetes Team: In-House Vs. Freelance

When you need to scale your infrastructure and your Kubernetes team, should you build an in-house team or hire freelance professionals? ...
Gilad David Mayaan | February 20, 2024 | careers, engineering, freelance, hiring, kubernetes, talent, team
kubernetes, network, logistics, security, Traefik Tigera container security Calico Red Hat Dynatrace

Traefik Labs Extends Cloud-Native Reach of API Gateway

Traefik Labs updated its API gateway to add support for WebAssembly (Wasm), OpenTelemetry and the Kubernetes Gateway API ...
Mike Vizard | February 14, 2024 | API, gateway, kubernetes, OpenTelemetry, Traefik, Wasm, WebAssembly
CloudBolt, StormForge, automation, Solo.io eBPF Automation in Microservices Security

Extending Kubernetes With Automation

Kubernetes offers many built-in automation features that significantly help developers follow DevOps best practices ...
Mariusz Michalowski | February 14, 2024 | automation, best practices, Helm, kubernetes, Operators
Diagrid Offers Free Trial Edition of Dapr SaaS Service

Diagrid Offers Free Trial Edition of Dapr SaaS Service

Diagrid is offering a free 30-day trial of Conductor Enterprise, a SaaS edition of the Dapr runtime platform for deploying microservices on Kubernetes clusters ...
Mike Vizard | February 13, 2024 | Dapr, Diagrid, kubernetes, runtime, SaaS, software as a service
Kubernetes business

Top K8s Workload Trends in the 2024 Kubernetes Benchmark Report

As DevOps, platform engineering and development teams leverage Kubernetes, they must examine workload reliability, security and cost efficiency ...
Joe Pelletier | February 13, 2024 | benchmark, cluster management, Fairwinds, kubernetes, workloads
operator Red Hat Kafka Real-Time Distributed Microservices

CNCF Advances Strimzi Operator for Kafka on Kubernetes

Strimzi, which provides an Operator that enables IT teams to declaratively deploy Apache Kafka messaging software on Kubernetes clusters, has become an incubation-level project ...
Mike Vizard | February 8, 2024 | cncf, Kafka, kubernetes, open source, Operators, Strimzi
KSOC Aims to Create Fingerprints for Container Images

KSOC Aims to Create Fingerprints for Container Images

KSOC has made available a free catalog for accessing open source container image fingerprints that detects changes to an environment ...
Mike Vizard | February 6, 2024 | cloud native security, container security, containers, KSOC, kubernetes
AI, containers, kuberneted, databases DH2i Postgres data Red Hat storage IBM Yugabyte Database

DH2i Adds Operator to Simplify SQL Server High Availability on Kubernetes

DH2i's Operator makes it simpler to deploy a platform for ensuring SQL Server high availability on Kubernetes clusters ...
Mike Vizard | February 6, 2024 | backup and recovery, database, DH2i, high availability, kubernetes, SQL server
Docker, security, Cosmonic Cilium Wasm Docker, Inc. Extends Tigera Networking Alliance

Why Generative AI and Wasm are a Perfect Match

When it comes to AI, we can see a specific reason why WebAssembly (Wasm) is the perfect match with generative AI ...
Matt Butcher | February 6, 2024 | cloud native computing, containers, docker, Wasm, WebAssembly
devsecops, supply chain, Kubernetes, practices, DevSecOps, JFrog, DevSecOps, Snyk Cerbos DevSecOps authorization incident Deepfence misconfigured Kubernetes security

Snyk Discloses ‘Leaky Vessels’ Vuln Requiring Docker Command Line Tool Fix

Snyk identified four vulnerabilities, collectively dubbed “Leaky Vessels,” that AppDev teams should address by updating the runc command line tool ...
Mike Vizard | February 2, 2024 | command line, container security, containers, kubernetes, leaky vessels, Snyk
  • ‹
  • 1
  • …
  • 28
  • 29
  • 30
  • 31
  • 32
  • …
  • 294
  • ›
Loading...

Techstrong TV

Click full-screen to enable volume control
Watch latest episodes and shows

Tech Field Day Events

UPCOMING WEBINARS

  • CloudNativeNow.com
  • DevOps.com
  • SecurityBoulevard.com
Solving Virtualization Dilemmas with Dell, Red Hat and Intel
4 February 2026
Solving Virtualization Dilemmas with Dell, Red Hat and Intel
Zero Trust for Agentic AI: Managing Non‑Human Identities at Scale
17 March 2026
Zero Trust for Agentic AI: Managing Non‑Human Identities at Scale
The AI Code Wave: How to Use Intelligent Quality Gates to Prevent Reviewer Burnout
4 March 2026
The AI Code Wave: How to Use Intelligent Quality Gates to Prevent Reviewer Burnout
Your “Pager” Is Lying to You: Fixing On-Call, Alerts, and MTTR for Real
3 March 2026
Your “Pager” Is Lying to You: Fixing On-Call, Alerts, and MTTR for Real
Zero Trust for Agentic AI: Managing Non‑Human Identities at Scale
17 March 2026
Zero Trust for Agentic AI: Managing Non‑Human Identities at Scale
The Prescriptive Path to AI Security: From Chaos to Scalable Governance
3 March 2026
The Prescriptive Path to AI Security: From Chaos to Scalable Governance
From Click to Compromise: Stopping Business Email Compromise at the Human and Identity Layer
19 February 2026
From Click to Compromise: Stopping Business Email Compromise at the Human and Identity Layer

Podcast


Listen to all of our podcasts

Press Releases

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

Deloitte Partners with Memcyco to Combat ATO and Other Online Attacks with Real-Time Digital Impersonation Protection Solutions

Deloitte Partners with Memcyco to Combat ATO and Other Online Attacks with Real-Time Digital Impersonation Protection Solutions

SUBSCRIBE TO CNN NEWSLETTER

MOST READ

Best of 2025: How Anthropic Dogfoods On Claude Code 

January 2, 2026

Best of 2025: Hardening Kubernetes Security with DevSecOps Practices

December 31, 2025

Best of 2025: The Observability Evolution: How AI and Open Source are Taming Kubernetes Complexity

December 31, 2025

Best of 2025: Docker Security in 2025: Best Practices to Protect Your Containers From Cyberthreats

December 26, 2025

Best of 2025: CAST AI Report Surfaces Massive Kubernetes Cloud Infrastructure Waste

January 2, 2026

RECENT POSTS

MetalBear Simplifies Testing of CI Pipelines on Kubernetes Staging Servers
App Dev Platforms for Kubernetes Features Social - Facebook Social - LinkedIn Social - X 

MetalBear Simplifies Testing of CI Pipelines on Kubernetes Staging Servers

January 23, 2026 Mike Vizard 0
How to Keep Cloud-Native Applications Running During DDoS-Scale Traffic Surges
Cloud-Native Development Contributed Content Social - Facebook Social - LinkedIn Social - X Topics 

How to Keep Cloud-Native Applications Running During DDoS-Scale Traffic Surges

January 20, 2026 Carl Torrence 0
IBM Adds Sovereign Core Platform Based on Red Hat OpenShift
Features Social - Facebook Social - LinkedIn Social - X 

IBM Adds Sovereign Core Platform Based on Red Hat OpenShift

January 15, 2026 Mike Vizard 0
How Do Cloud-Native Teams Balance Engineering Excellence With Strong Product Branding? 
Cloud-Native Development Contributed Content Social - Facebook Social - LinkedIn Social - X Topics 

How Do Cloud-Native Teams Balance Engineering Excellence With Strong Product Branding? 

January 13, 2026 Lucy Manole 0
Kubernetes v1.35 Arrived, Right On Workload-Aware Schedule
Cloud-Native Development Features Kubernetes Social - Facebook Social - LinkedIn Social - X 

Kubernetes v1.35 Arrived, Right On Workload-Aware Schedule

January 12, 2026 Adrian Bridgwater 0
  • About
  • Media Kit
  • Sponsor Info
  • Write for Cloud Native Now
  • Copyright
  • TOS
  • Privacy Policy
Powered by Techstrong Group
Copyright © 2026 Techstrong Group, Inc. All rights reserved.
×

Exploring Trends in Mainframe Application Modernization

Step 1 of 8

12%
What is your organization’s primary approach to modernizing mainframe applications?(Required)
Does your organization currently have an application modernization initiative in place?(Required)
What TWO factors MOST OFTEN drive your organization’s decisions to modernize specific mainframe modules? (Select up to 2 responses)(Required)
What strategies does your organization use for mainframe code transformation?(Required)
What is your organization's strategic direction for mainframe applications over the next 3-5 years?(Required)

What factors MOST influence your organization's platform decisions for mainframe applications? (Select up to 2 responses)(Required)
What are the TOP TWO benefits your organization expects from mainframe modernization? (Select up to 2 responses)(Required)
How effective have AI-powered tools for code conversion been in your modernization efforts?(Required)

×