Topics
Understanding Kubernetes Compliance and Security Frameworks
There’s a reason why Kubernetes (K8s) has become the world’s leading container orchestration platform, with 74% of today’s IT companies using it for containerized workloads in production. It’s often the simplest way ...
DevOps Needs SQL Server Containers for Windows
In an earlier blog, I explained the need for DevOps database platforms. The DevOps database requirements apply to all variations of containerized SQL databases as needed to support the variations that exist ...
4 Container Runtime Projects From CNCF
Containers have become a popular method to build out fully independent and tightly controlled applications that essentially act as if they’re running on their own computer. Container runtimes are the software that ...
Portworx by Pure Storage Extends K8s Data Protection
Portworx by Pure Storage has updated its backup and recovery platform to add an ability to offload backups from CSI snapshots to object storage platforms. IT teams can now also back up ...
7 Open Source Cloud-Native Tools For Observability and Analysis
In 2021, ‘observability’ is close to gaining buzzword status. This is perhaps because, for years, monitoring wasn’t as standardized in software development. Tracing was given less forethought, and applications produced logs in ...
What Holistic Cloud-Native Security and Observability Look Like
The rise of cloud-native and containerization, along with the automation of the CI/CD pipeline, introduced fundamental changes to existing application development, deployment, and security paradigms. Because cloud-native is so different from traditional ...
Cloud-Native: The Engine Driving a Trillion-Dollar Economy
You’d be hard-pressed to find a large business anywhere in the world where cloud-native wasn’t at least being discussed. For a philosophy that’s still in its relative infancy, it’s become ubiquitous among ...
Role-Based Access Control with Cloud Foundry in Kubernetes
In modern software development infrastructure, role-based access control (RBAC) is a hierarchical approach to security. It is basically a security design that restricts access to sensitive resources based on the role that ...
6 Cloud-Native Tools For Security and Compliance
The Cloud Native Computing Foundation (CNCF) continues to lead the industry in supporting new cloud-native technologies. The innovative packages hosted by CNCF have seen impressive adoption rates among software teams of all ...
DoKC Report Sees Stateful App Surge on Kubernetes
A report published by the Data on Kubernetes Community (DoKC) finds 70% of respondents report they are now running stateful applications on Kubernetes clusters with another 20% saying they expect to see ...

