Saturday, February 7, 2026
Cloud Native Now

Cloud Native Now


MENUMENU
  • Home
  • Webinars
    • Upcoming
    • Calendar View
    • On-Demand
  • Podcasts
    • Cloud Native Now Podcast
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
  • About
  • Sponsor
MENUMENU
  • News
    • Latest News
    • News Releases
  • Cloud-Native Development
  • Cloud-Native Platforms
  • Cloud-Native Networking
  • Cloud-Native Security

Social – LinkedIn

Kubernetes

Kubernetes Could Use a Different Linux Scheduler

A pair of Cambridge researchers have found a way to squeeze 10 – 20% more capacity from Kubernetes clusters, simply by making a tweak in the way the Linux kernel schedules jobs ...
Joab Jackson | February 6, 2026 | CFS, kubernetes, LAGS, linux
Cluster API Update Makes Managing Kubernetes Environments Simpler

Cluster API Update Makes Managing Kubernetes Environments Simpler

The maintainers of the Cluster Application Programming Interface (API) for Kubernetes clusters have released an update that makes it simpler to automatically trigger in-place updates to create or delete a machine. Version ...
Mike Vizard | February 4, 2026 | AI, Broadcom, Cluster API, IT, kubernetes
Kubernetes and IPv6: Together at Last?

Kubernetes and IPv6: Together at Last?

As administrators migrate their clusters from Ingress NGINX, which is being retired from the Kubernetes line-up next month, they might want to consider adding another task to their job: migrating their network ...
Joab Jackson | February 4, 2026 | Ingress NGINX, IPv6, kubernetes
ingress Sysdig SUSE Siloscape security-as-code Docker

Noma Security Identifies Security Flaw in Docker AI Assistant

Noma Security today revealed it has discovered a critical security flaw in the artificial intelligence (AI) assistant made available by Docker, Inc. Sasi Levi, security research lead for Noma Security, said the ...
Mike Vizard | February 3, 2026 | AI, docker, Noma Security, security
MinIO, data, AI, migration Cinchy Cloudera Koyeb

Designing Reliable Data Pipelines in Cloud-Native Environments 

Discover how to design reliable data pipelines in cloud-native environments, emphasizing disciplined design decisions, observability, and team ownership to ensure data integrity and system reliability amidst constant change ...
Alex Williams | February 3, 2026 | cloud native, data integrity, data pipelines, design choices, distributed services, infrastructure, observability, reliability, scalability, team ownership
Kubernetes Begins Work on Pod Checkpoint/Restore

Kubernetes Begins Work on Pod Checkpoint/Restore

Kubernetes may be getting a feature that has long been enjoyed by supercomputer users: checkpoint/restore. Just as the name indicates, checkpoint/restore is the ability to bookmark a distributed workload such that if ...
Joab Jackson | February 2, 2026 | Checkpointing, containers, KEP, kubernetes, restore
WASM,

Wasm at 10, What Lies Ahead

Celebrating 10 years of WebAssembly—Wasm moves beyond browsers to power edge computing and AI, silently redefining where computation happens ...
Alan Shimel | February 1, 2026 | 10th birthday, AI runtimes, browser, edge computing, technology, Wasm, WebAssembly
posture, security posture management, KSPM, Kubernetes KSPM cloud-native Fugue security

Edera Advisory Highlights Remote Code Execution Flaw in Kubernetes

Edera, a provider of a platform for securing container runtime environments, this week published an advisory that notes there is a design flaw that could enable full remote code execution (RCE) in ...
Mike Vizard | January 29, 2026 | Edera, kubernetes, Kubernetes security, RCE
Latest Container Vulnerabililty

Survey Surfaces Raft of Container Security Challenges

A BellSoft survey reveals gaps in container security practices, showing that human error, limited vulnerability scanning, and infrequent patching continue to expose cloud-native environments to risk ...
Mike Vizard | January 29, 2026 | BellSoft survey, cloud native security, container patching, container security, DevSecOps, image signing, Kubernetes security, SBOM, software supply chain security, vulnerability scanning
CNCF Survey Surfaces Widespread Adoption of Kubernetes Clusters

CNCF Survey Surfaces Widespread Adoption of Kubernetes Clusters

A global survey of 628 IT professionals finds a full 82% work in organizations that are running Kubernetes clusters in production environments. Conducted by Linux Foundation Research on behalf of the Cloud ...
Mike Vizard | January 26, 2026 | cncf, kubernetes, Kubernetes adoption, Linux Foundation
  • 1
  • 2
  • 3
  • …
  • 43
  • ›
Loading...

Techstrong TV

Click full-screen to enable volume control
Watch latest episodes and shows

Tech Field Day Events

UPCOMING WEBINARS

  • CloudNativeNow.com
  • DevOps.com
  • SecurityBoulevard.com
Closing the Cloud Security Gap With Runtime Protection
25 March 2026
Why Argo CD Breaks at Scale (and How to Avoid It)
18 March 2026
Why Argo CD Breaks at Scale (and How to Avoid It)
Why Argo CD Breaks at Scale (and How to Avoid It)
18 March 2026
Why Argo CD Breaks at Scale (and How to Avoid It)
Zero Trust for Agentic AI: Managing Non‑Human Identities at Scale
17 March 2026
Zero Trust for Agentic AI: Managing Non‑Human Identities at Scale
The Future of Agentic Software Delivery Across Source & Binaries
11 March 2026
The Future of Agentic Software Delivery Across Source & Binaries
Closing the Cloud Security Gap With Runtime Protection
25 March 2026
Closing the Cloud Security Gap With Runtime Protection
Zero Trust for Agentic AI: Managing Non‑Human Identities at Scale
17 March 2026
Zero Trust for Agentic AI: Managing Non‑Human Identities at Scale
Securing the Future of AI-Native Development: Trusting the Code You Didn’t Write
12 March 2026
Securing the Future of AI-Native Development: Trusting the Code You Didn’t Write

Podcast


Listen to all of our podcasts

Press Releases

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

Deloitte Partners with Memcyco to Combat ATO and Other Online Attacks with Real-Time Digital Impersonation Protection Solutions

Deloitte Partners with Memcyco to Combat ATO and Other Online Attacks with Real-Time Digital Impersonation Protection Solutions

SUBSCRIBE TO CNN NEWSLETTER

MOST READ

Predict 2026: AI is Forcing Cloud Native to Grow Up

January 9, 2026

IBM Adds Sovereign Core Platform Based on Red Hat OpenShift

January 15, 2026

Kubernetes v1.35 Arrived, Right On Workload-Aware Schedule

January 12, 2026

CNCF Survey Surfaces Widespread Adoption of Kubernetes Clusters

January 26, 2026

MetalBear Simplifies Testing of CI Pipelines on Kubernetes Staging Servers

January 23, 2026

RECENT POSTS

Kubernetes Could Use a Different Linux Scheduler
Cloud-Native Development Features Kubernetes Social - Facebook Social - LinkedIn Social - X 

Kubernetes Could Use a Different Linux Scheduler

February 6, 2026 Joab Jackson 0
Cluster API Update Makes Managing Kubernetes Environments Simpler
Features Kubernetes Social - Facebook Social - LinkedIn Social - X 

Cluster API Update Makes Managing Kubernetes Environments Simpler

February 4, 2026 Mike Vizard 0
Kubernetes and IPv6: Together at Last?
Cloud-Native Networking Cloud-Native Platforms Container Networking Features Kubernetes Latest News Social - Facebook Social - LinkedIn Social - X 

Kubernetes and IPv6: Together at Last?

February 4, 2026 Joab Jackson 0
Noma Security Identifies Security Flaw in Docker AI Assistant
Cloud-Native Security Docker Features Social - Facebook Social - LinkedIn Social - X 

Noma Security Identifies Security Flaw in Docker AI Assistant

February 3, 2026 Mike Vizard 0
Designing Reliable Data Pipelines in Cloud-Native Environments 
Contributed Content Data Governance Observability Social - Facebook Social - LinkedIn Social - X Topics 

Designing Reliable Data Pipelines in Cloud-Native Environments 

February 3, 2026 Alex Williams 0
  • About
  • Media Kit
  • Sponsor Info
  • Write for Cloud Native Now
  • Copyright
  • TOS
  • Privacy Policy
Powered by Techstrong Group
Copyright © 2026 Techstrong Group, Inc. All rights reserved.
×

Exploring Trends in Mainframe Application Modernization

Step 1 of 8

12%
What is your organization’s primary approach to modernizing mainframe applications?(Required)
Does your organization currently have an application modernization initiative in place?(Required)
What TWO factors MOST OFTEN drive your organization’s decisions to modernize specific mainframe modules? (Select up to 2 responses)(Required)
What strategies does your organization use for mainframe code transformation?(Required)
What is your organization's strategic direction for mainframe applications over the next 3-5 years?(Required)

What factors MOST influence your organization's platform decisions for mainframe applications? (Select up to 2 responses)(Required)
What are the TOP TWO benefits your organization expects from mainframe modernization? (Select up to 2 responses)(Required)
How effective have AI-powered tools for code conversion been in your modernization efforts?(Required)

×