Posts in category

Cloud-Native


At its heart, the SPIRE project aims to solve the problem of securely issuing workload identities at scale, no matter where the workload is running. It does that by having an extensible architecture composed of plugins that allow SPIRE to grow depending on the needs of supporting different platforms, cloud providers, etc. Until now, SPIRE could only …

KubeCon 2021 in North America saw the launch of the Cloud Native Maturity Model, a model launched by the Cartografos Working Group to help adopters and end-users to navigate the CNCF landscape and the wider cloud native ecosystem. As part of the launch, the Group also launched the book Admiral Bash’s Island Adventure.  Today, we are pleased to announce …

As we build new software and other technologies, we do not often consider the ethical implications of these tools. Considerations like how a piece of code may be used by a malicious actor, whether a hardware design could be modified for a nefarious purpose, or simply how an algorithm might affect different classes of person …

Cost optimization is a growing concern for organizations rapidly moving towards open-source and cloud-native projects based on Kubernetes. While flexibility remains one of the key strengths of Kubernetes, it often leads to excessive spending, due to overprovisioning of workload resources. The primary challenge with cost projection and control in a Kubernetes cost management ecosystem is …

You can tell the maturity of something by its challenges. For example, the problems of a 27-year-old are different from those of a 47-year-old. In case it’s not clear, this is my attempt at making a relatable analogy to the maturity of Kubernetes. Though, it might be more accurate to say Kubernetes has reached a …

API gateways play a vital role while exposing microservices. They are an additional hop in the network that the incoming request must go through in order to communicate with the services. An API gateway does routing, composition, protocol translation, and user policy enforcement after it receives a request from client and then reverse proxies it …

Debugging is twice as hard as writing the code in the first place. Therefore, if you write the code as cleverly as possible, you are, by definition, not smart enough to debug it. Brian W. Kernigham Debugging is hard, and in some places—like in the cloud, production, or Java Spring—it’s even harder. Moreover, debugging isn’t …

Kubernetes never existed without Baremetals !! If we say that, it would not be incorrect for enterprises at all. It is of no surprise that some of the personas have not been able to realize that fact. Not that, they need to but knowledge is the currency. And, our intention here is to explain just …

Red Hat, Inc., the world’s leading provider of open source solutions, today announced Red Hat Application Foundations, a connected set of application services that together with Red Hat OpenShift, help accelerate containerized application development and delivery across hybrid and multicloud environments. Red Hat Application Foundations serves as a toolkit for organizations looking to quickly build and integrate application and data …

Why Enterprises Should adopt a Zero Trust Architecture Zero Trust was a concept coined by John Kindervag at Forrester in 2009. As cyberattacks and ransomware have become more frequent, business disruptions and data theft more common, zero-trust has become more relevant. Central to the notion of zero-trust is “never trust, always verify.” This requires all traffic …