Where Did DevSecOps Come From? In this topic “DevSecOps explained in 5 minutes” we’ll attempt to give readers an overview of DevSecOps, and how it came about …
Machine learning is a subject with a lot of potential. That potential is hard to exploit because of the complex pipelines and the challenges of scalability. Tools such as TensorFlow and Jupyter do make life easier for developers, but machine learning and AI are two areas of computing where the ideas of Continuous Integration and […]
If you’re unsure of where to find effective management strategies for Cloud cluster storage, look no further than Kubernetes management. By 2022, the Kubernetes market is expected to grow to over $4.3 billion in the US, which is over double what it was in 2019! Since over 87% of businesses were already running container solutions in 2019, these […]
One of the things that can determine the success of your business is whether or not you participate in big data analysis. The more data you have, the better you can analyze and improve your processes. However, it’s also impossible for a human to go through the potentially millions of data points you can collect, making […]
The official name is actually Argoproj; however, most people just say Argo. It’s a collection of open source tool that has been branded as something to help you “get stuff done” when using Kubernetes.
It includes Argo Rollouts, Argo Events, Argo CD, and Argo Workflows. Each of these offers unique services and features that make it an invaluable part of the Argo and Kubernetes package and that lends to improved efficiency for your processes.
One of the most important things you need to take care of is the security of your business. Of course, you’ve more than likely added the proper security measures to protect your computer system from being hacked, as well as added locks and security systems to your actual structure where you work. However, dangers to your company’s […]
Industry analysts predict that 83% of all enterprise workloads will be in the cloud by the end of 2020. To leverage the scalability and flexibility of the cloud, developers can deploy independent microservices into their cloud environments. Yet, transitioning to a distributed microservice architecture isn’t without its challenges. As organizations grow, it becomes increasingly difficult to connect, secure, control, […]
According to Forrester, 58 percent of developers have reported that their companies are either currently using containers or plan to use containers within the next year. However, in a survey by CNCF, 43 percent say security in enterprise adoption of containers is a huge challenge. We are assuming this challenge has arisen due to a […]
As second follow up to our post “CNCF Spotlight: The Top 5 Cloud-Native ProjectsThat We Love”, we take a deeper dive into Helm, The package manager for Kubernetes. So what is Helm? Helm helps you manage Kubernetes applications — Helm Charts help you define, install, and upgrade even the most complex Kubernetes application. Charts are easy […]
Kubernetes Security Controls and Enforcement: Applying Lessons from the CNCF K8s Security Audit The recent Kubernetes security audit and the issues it identified got lots of publicity. But did you know that the audit reports also include many recommendations you can apply today to improve your security posture? In this webinar the CNCF discusses: Key […]