Social – LinkedIn

Deploy Serverless Lambdas Confidently with Canary
Exploring Lambda function releases using CD pipelines and canary deployments, comparing deployment strategies, detailing best practices and offering insights on making releases safer and faster. ...

Smarter Containers: How to Optimize Your Dockerfiles for Speed, Size and Security
Properly designed Dockerfiles can save construction time, enable the creation of smaller images and facilitate deployment ...

Serverless Computing: Unlocking the Potential for Scalable and Cost-Effective Solutions
Advance in serverless computing by focusing on organizing, versioning and automating functions while controlling costs. ...

Components of the Kubernetes Architecture
Kubernetes architecture, how it works and why it is considered the de facto platform for deploying and managing containerized applications. ...

CAST AI Analysis Surfaces Massive Kubernetes Infrastructure Waste
An analysis of Kubernetes clusters deployed in cloud computing environments by more than 2,100 organizations finds the average CPU utilization across Kubernetes clusters is just 10%, with memory utilization rates standing at ...

Database Management for Hundreds of Kubernetes App Clusters
As the adoption of Kubernetes increases, managing data services across multiple application clusters becomes a critical challenge ...

PKI for Kubernetes: Are You Set Up for Security and Scale?
Deploying PKI often introduces hidden complexities. Platform engineers are faced with assorted options — built-in approaches, DIY PKI setups, open-source tools and other solutions ...

Beyond Size: Don’t Panic at the Distroless
The idea behind distroless is straightforward enough — take away everything unnecessary, leaving only the application and its absolute bare minimum runtime dependencies ...

Aviatrix Adds Kubernetes Firewall to Secure Cloud-Native Platforms
Aviatrix has launched a Kubernetes firewall designed to specifically address the unique requirements of cloud-native computing environments that typically consume ten times as many IP addresses than legacy platforms ...

Solving Container Security Challenges: Vulnerabilities, Shadow Deployments and Deployment Gaps
In containerized environments security risks can exist in three areas: Vulnerabilities in software, shadow containers and deployment problems ...