All Member Posts


Introduction: a closer look at Kubernetes and Nomad
Member Post Introduction: a closer look at Kubernetes and Nomad
Guest post by Rob Newsome, Head of Product Management at stack.io In the realm of container orchestration, Kubernetes and Nomad are prominent figures, each furnishing a distinct method to container management. Kubernetes is renowned for its exhaustive features...
October 23, 2023 | By Rob Newsome

View from the edge
Member Post View from the edge
Guest post originally published on the BrainGu blog by Dr. Mark Peters, Director of Engineering Operations, BrainGu Today, everyone wants to run to the edge, and hopefully not fall. The buzzwords last year involved AI, ML, and some...
October 20, 2023 | By Mark Peters

Shift down to the platform, not left to the dev
Member Post Shift down to the platform, not left to the dev
Guest post originally published on Mia-Platform’s blog by Michel Murabito, Developer Advocate at Mia‑Platform. In the ever-evolving world of software development, a new approach to developing and delivering software, called shift down, has emerged to challenge conventional methods....
October 18, 2023 | By Michel Murabito

Under the hood of fault tolerant private cloud network (part 2 – the how)
Member Post Under the hood of fault tolerant private cloud network (part 2 – the how)
Guest post originally published on Netris’ blog by Alex Saroyan, CEO/co-founder at Netris This is a continuation of Article 1. If you want to learn why we spend so much time thinking about High Availability, go there. Otherwise, if...
October 16, 2023 | By Alex Saroyan

What is stateless authorization?
Member Post What is stateless authorization?
Guest post by Charith Ellawala, Co-Founder & CTO at Cerbos In the world of software development, authorization is one of the most important aspects to consider when designing any application. Without proper authorization, an application can become vulnerable...
October 13, 2023 | By Charith Ellawala

Kubernetes secure development best practices in action
Member Post Kubernetes secure development best practices in action
Guest post by Saylor Berman, Senior Software Engineer, F5 NGINX and Ciara Stacke, Senior Software Engineer, F5 NGINX Using minimal Docker containers is a popular strategy in the world of containerization due to benefits of security and resource...
October 11, 2023 | By Saylor Berman and Ciara Stacke

Exploring Kepler’s potentials: unveiling cloud application power consumption
Member Post Exploring Kepler’s potentials: unveiling cloud application power consumption
Guest post by Marcelo Amaral, Sunyanan Choochotkaew, Eun Kyung Lee, Huamin Chen, and Tamar Eilam Stepping into the exciting world of technology where things are always on the move, we’re introduced to cool new applications like the ones...
October 11, 2023

Keeping secrets secure on Kubernetes
Member Post Keeping secrets secure on Kubernetes
Member post originally published on the CyberArk blog by John Walsh Handling secrets in cloud-native environments is a challenge for many organizations. Virtually any application requires some sort of secret, such as a database password, a service token,...
October 10, 2023 | By John Walsh

Secure your Kubernetes environment with OPA and Gatekeeper
Member Post Secure your Kubernetes environment with OPA and Gatekeeper
Guest post originally published on SighUP’s blog by Simone Ragonesi We will introduce you to the powerful combination of Open Policy Agent (OPA) and Gatekeeper for Kubernetes security. In this article, we will introduce you to the powerful combination...
October 9, 2023

A three-stage approach to multi-architecture migration
Member Post A three-stage approach to multi-architecture migration
Member post by Cheryl Hung, Senior Director, Infrastructure Ecosystem, at Arm A recent trend in cloud-native development is the use of multi-architecture infrastructures, which can run workloads on either x86 or Arm architectures. At a high level, the...
October 6, 2023 | By Cheryl Hung