All Member Posts


Introducing Kubescape 3.0
Member Post Introducing Kubescape 3.0
Member post originally published on Kubescape’s blog by Craig Box, Kubescape maintainer We are excited to announce the preview release of Kubescape 3.0, the next generation of the CNCF Kubernetes security posture management tool. Kubescape 3.0 will add: Most of...
November 14, 2023 | By Craig Box

Decoding workload specification for effective platform engineering
Member Post Decoding workload specification for effective platform engineering
Member post originally published on InfraCloud’s blog by Atulpriya Sharma In an ideal world, developers focus on coding applications while the operations team focuses on their seamless deployments of workloads to different environments. However, this is far from...
November 13, 2023 | By Atulpriya Sharma

PromCon recap: unveiling Perses, the GitOps-friendly metrics visualization tool
Member Post PromCon recap: unveiling Perses, the GitOps-friendly metrics visualization tool
Member post originally published on Logz.io’s blog by Dotan Horovits In the vibrant atmosphere of PromCon during the last week of September, attendees were treated to a plethora of exciting updates from the Prometheus universe. A significant highlight of the...
November 11, 2023 | By Dotan Horovits

It’s time for authorization standards: AuthZEN
Member Post It’s time for authorization standards: AuthZEN
Member post originally published on Aserto’s blog by Omri Gazitt In the beginning… Anyone remember the time before we had identity standards? I do. Back in the early days of SaaS, every app had to build its own...
November 3, 2023 | By Omri Gazitt

OpenTelemetry in decoupled event driven architectures – solving for the black box when your consuming applications are constantly changing
Member Post OpenTelemetry in decoupled event driven architectures – solving for the black box when your consuming applications are constantly changing
Member post from Rob Williamson, Solace The goal of OpenTelemetry is to have a common system for tracing across different (aka distributed) technologies. It solves the problems created when systems are deployed across hybrid and multi-clouds, up and...
November 2, 2023

Mechanism and implementation of lease
Member Post Mechanism and implementation of lease
Member post by Datenlord 1. Introduction Xline is an open source distributed KV storage engine for managing small amounts of critical data, with the aim of high performance data access and strong consistency across data centers. Xline provides...
November 1, 2023 | By Datenlord

The role of Large Language Models (LLMs) in automating pipeline conversions from legacy to Tekton
Member Post The role of Large Language Models (LLMs) in automating pipeline conversions from legacy to Tekton
Member post by Siva Gurunathan, CTO at Ozone Cloud Inc Challenges in New Technology Migrations There have been many technological advancements in the market today, but the main hindrance is the cumbersome process of switching from the existing...
October 31, 2023 | By Siva Gurunathan

Securing attacks targeted at user or kernel level for customer X with KubeArmor & AWS Bottlerocket
Member Post Securing attacks targeted at user or kernel level for customer X with KubeArmor & AWS Bottlerocket
Member post by AccuKnox Introduction: In the realm of cybersecurity, ensuring that virtualized or cloud-based infrastructures security is paramount. One crucial aspect is safeguarding applications where most of our crown-jewel sits and are susceptible to dynamic changes. In...
October 26, 2023 | By AccuKnox

DevOps to platform engineering: how we got here?
Member Post DevOps to platform engineering: how we got here?
Guest post originally published on InfraCloud’s blog by Vishal Biyani In the decade of 2000, a lot was happening in the software industry. The Toyota lean movement had proven to be of significant value in the production of...
October 25, 2023 | By Vishal Biyani

Confidential computing: great for security, not for privacy
Member Post Confidential computing: great for security, not for privacy
Guest post originally published on Elastisys’ blog In this post, we take a closer look at confidential computing (CC). What is it? What does it promise? Does it live up to its hype? And can companies finally trust...
October 24, 2023