News Category: Enterprise

The 4 Major Tenets of Kubernetes Security

In a previous article, we learned about the threats to a Kubernetes deployment that may result in a multitude of compromises and undesirable scenarios. With these threat models in mind, we can now explore Kubernetes security along four major tenets: authentication and authorization resource...
Read 0 Comments

Enterprises Identify 10 Essential Tools for DevOps

In rough order of their appearance in the DevOps pipeline, based on real-world user feedback, here are the most essential DevOps tools:In some of these 10 major categories, just one tool rules the roost, such as Docker for application containers and Jenkins for CI/CD. In others, DevOps...
Read 0 Comments

Xen Project Contributor Spotlight: Kevin Tian

The Xen Project is comprised of a diverse set of member companies and contributors that are committed to the growth and success of the Xen Project Hypervisor. The Xen Project Hypervisor is a staple technology for server and cloud vendors, and is gaining traction in the embedded, security and...
Read 0 Comments

The CNCF Takes Steps Toward Serverless Computing

Even though the idea of ‘serverless’ has been around since 2006, it is a relatively new concept. It’s the next step in the ongoing revolution of IT infrastructure that goes back to the days when one server used to run one application. Many vendors and users who attended KubeCon Austin expressed a...
Read 0 Comments

Observability: The New Wave or Buzzword?

Monitoring tells you whether the system works. Observability lets you ask why it’s not working. — Baron Schwartz (@xaprb) October 19, 2017 In Monitoring in the time of Cloud Native, Cindy Sridharan views monitoring (alerting and overview dashboards) as the tip of the observability iceberg with...
Read 0 Comments

Fluid HPC: How Extreme-Scale Computing Should Respond to Meltdown and Spectre

The Meltdown and Spectre vulnerabilities are proving difficult to fix, and initial experiments suggest security patches will cause significant performance penalties to HPC applications. Even as these patches are rolled out to current HPC platforms, it might be helpful to explore how future HPC...
Read 0 Comments

The History of the Service Mesh

The idea of a service mesh is still a fairly new concept for most people, so it may seem a little funny to already be talking about its history. But at this point Linkerd has been running in production by companies around the world for over 18 months — an eternity in the cloud-native ecosystem —...
Read 0 Comments

Julia vs R vs Python: Simple Optimization

In this post, I will try to compare and contrast Julia, R, and Python via a simple maximum likelihood optimization problem which is motivated by a problem from the credit risk domain and is discussed in more detail in this post. TL;DR For such a simple optimization problem, R, Julia, and Python/...
Read 0 Comments

How to Measure the Efficacy of Your Container Security Solution with Real World Exploits

There has never been a better time to be a DevOps engineer. Compared to traditional web stacks, containerization has dramatically streamlined the task of deploying web services such as databases, key/value stores and servers. Furthermore, container orchestration tools, like Google’s Kubernetes and...
Read 0 Comments

What is Software Defined Storage?

The concept of "software defined storage" (SDS) seems to be everywhere, if you read about the data storage industry or explore storage products.  However, the software defined storage definition remains a little vague – or perhaps more than a little vague. Most people seem to agree that at first,...
Read 0 Comments

Pages

Click Here!