KubeCon + CloudNativeCon
15 Point Kubernetes Security Checklist
Thoroughly securing containers and Kubernetes environments – especially in production where they’re most vulnerable – requires a layered security strategy with consistent vigilance across multiple fronts. Kubernetes itself has become an increasingly ...
Red Hat, IBM Launch Konveyor to Aggregate Kubernetes Tools
At the online KubeCon + CloudNativeCon Europe 2021 event today Red Hat and IBM Research announced they are teaming up to create a Konveyor to advance adoption of a collection of tools ...
Modernizing Legacy Applications: Technical Lessons
This is part two of lessons learned from modernizing legacy applications to a microservices architecture. You can check out part one here. Part one focused on organizational lessons learned. This segment is ...
When Microservices Fall Short
Microservices principles are used to decouple different business domains through a bounded context. We can develop microservices independently to benefit from polygot architecture. But microservices architecture is not completely able to solve ...
Lessons in Legacy to Microservices Modernization
Modernizing legacy applications to a microservices architecture is very different from starting from scratch on a greenfield new application project. Large companies typically have working software that spans decades, and the challenges ...
The Double-Edged Sword of Kubernetes
Developing and operating distributed architectures is complex and tedious. Over the past decade, many orchstration technologies helped bring the development environment closer to the actual deployment system to simplify development. As you’re ...
The Biggest Enemy in a Software-Defined World: Complexity
Ten years ago this August, Marc Andreessen made his famous declaration that “software is eating the world.” In the decade since, the “dramatic and broad technological and economic shift” that Andreessen illuminated ...
10 Steps to Reduce Cloud Waste
Industry pundits confirm that cloud computing has not only gone mainstream, but also that nearly all organizations are following the trend. For example, according to recent research, more than 90% of all organizations ...
Service Mesh Extensibility Explained
Have you ever wondered how to extend your service mesh for your specific business needs? Perhaps you need to add external authorization or advanced rate-limiting? Or maybe you want to add custom ...
Microservices: A Welcome Disruption
Much is discussed about Kubernetes and containers, but the real benefit of this platform comes in the form of microservices—small, independently deployed functions that will define digital transformation. Microservices give us the ...