mapping Backslash Red Hat edge streaming CNCF VMware Ambassador Labs value stream mapping

Red Hat Enlists Lockheed Martin to Bring AI to K8s Edge

At the KubeCon + CloudNativeCon North America conference, Red Hat and Lockheed Martin today announced a collaborative effort to build and deploy AI-infused Kubernetes applications on edge computing platforms. At the core ...
Lightbend Azul Java migration

Avoid This Common Cloud-Native Migration Trap

Migrating your software applications to the cloud requires significant development effort and testing, along with the risk of introducing complex infrastructure changes. Moving to a cloud-native architecture is even more involved. Not ...
Konveyor Loft Labs Ubuntu

Loft Labs Integrates Argo CD With Virtual Kubernetes Clusters

At the KubeCon + CloudNativeCon North America conference, Loft Labs announced it has integrated the virtual instances of the Kubernetes clusters it enables with the open source Argo continuous delivery (CD) platform ...
Cosmonic Cilium Wasm Docker, Inc. Extends Tigera Networking Alliance

Docker, Inc. Adds Support for Wasm to Docker Desktop Tools

Docker, Inc. today announced at the Kubecon + CloudNativeCon North America conference that developers will be able to use their Docker Desktop environments to build applications using Web Assembly (Wasm) software artifacts ...
KubeVirt Upbound control plane Kubermatic Crossplane

KubeVirt Is Key to Protecting VM Investment

Virtual machines or containers? Containers or virtual machines? This is a discussion going on in many organizations, but the reality is that it’s not a matter of either/or. Rather, it’s all about ...
cloud container Kubernetes costs cost IBM

Managing Container and Kubernetes TCO

Over the past decade, we’ve seen massive growth in cloud Kubernetes adoption as organizations have raced to take advantage of the improved velocity and scalability, and reduced operational complexity, that Kubernetes promises ...
Snyk Cerbos DevSecOps authorization incident Deepfence misconfigured Kubernetes security

5 Laws of Cloud-Native Authorization

In a microservices world, each service needs to verify that a subject (user or machine) has permission to perform an operation on a resource that the service manages. But in an agile ...
container Sysdig Volterra

Sysdig Adds Kubernetes Cost Monitoring Tool to Portfolio

Sysdig today adds a Cost Advisor module for Kubernetes clusters to its portfolio of tools for managing and securing container environments. Aaron Newcomb, director of product marketing for Sysdig, says as an ...
Kubernetes Helm Charts

When Kubernetes-as-a-Service Doesn’t Cut It

When it comes to installing and managing your own Kubernetes service, the advice you’ll usually hear is, “Don’t do it!” But sometimes, that advice is wrong. Managed Kubernetes service from the cloud ...
Uptycs containerization legacy Kubernetes Ermetic CNAPP antipatterns Mirantis Twistlock Provides Full Lifecycle

3 Design Antipatterns That Sabotage K8s App Scalability

Software design patterns were popularized in the 1990s by the authors of the influential computer science book Design Patterns: Elements of Reusable Object-Oriented Software. Although the book focuses on software development, design ...