Blog


Confidential computing: great for security, not for privacy
Member Post Confidential computing: great for security, not for privacy
Guest post originally published on Elastisys’ blog In this post, we take a closer look at confidential computing (CC). What is it? What does it promise? Does it live up to its hype? And can companies finally trust...
October 24, 2023

Introduction: a closer look at Kubernetes and Nomad
Member Post Introduction: a closer look at Kubernetes and Nomad
Guest post by Rob Newsome, Head of Product Management at stack.io In the realm of container orchestration, Kubernetes and Nomad are prominent figures, each furnishing a distinct method to container management. Kubernetes is renowned for its exhaustive features...
October 23, 2023 | By Rob Newsome

View from the edge
Member Post View from the edge
Guest post originally published on the BrainGu blog by Dr. Mark Peters, Director of Engineering Operations, BrainGu Today, everyone wants to run to the edge, and hopefully not fall. The buzzwords last year involved AI, ML, and some...
October 20, 2023 | By Mark Peters

 A Moment of Silence 
Staff Post  A Moment of Silence 
Our deepest sympathies go out to everyone affected by the escalating conflict in the Middle East. We are profoundly saddened by the suffering and loss of lives caused by the conflict. We condemn terrorism in all forms, and...
October 19, 2023

From non-tech to CNCF Ambassador: transforming my career journey
Ambassador Post From non-tech to CNCF Ambassador: transforming my career journey
Guest post by Julia Furst Morgado, Global Technologist at Kasten by Veeam The pandemic has brought significant changes in our lives, prompting many of us to reevaluate our career paths and make bold decisions. For me, it was...
October 19, 2023 | By Julia Furst Morgado

Announcing the Kubernetes policy based governance risk and compliance paper
Community Post Announcing the Kubernetes policy based governance risk and compliance paper
Guest post by Jim Bugwadia The CNCF Kubernetes Policy Working group (WG) has just released a new paper on policy based Governance, Risk, and Compliance to help educate the community about how cloud native best practices can be...
October 19, 2023 | By Jim Bugwadia

Shift down to the platform, not left to the dev
Member Post Shift down to the platform, not left to the dev
Guest post originally published on Mia-Platform’s blog by Michel Murabito, Developer Advocate at Mia‑Platform. In the ever-evolving world of software development, a new approach to developing and delivering software, called shift down, has emerged to challenge conventional methods....
October 18, 2023 | By Michel Murabito

Under the hood of fault tolerant private cloud network (part 2 – the how)
Member Post Under the hood of fault tolerant private cloud network (part 2 – the how)
Guest post originally published on Netris’ blog by Alex Saroyan, CEO/co-founder at Netris This is a continuation of Article 1. If you want to learn why we spend so much time thinking about High Availability, go there. Otherwise, if...
October 16, 2023 | By Alex Saroyan

What is stateless authorization?
Member Post What is stateless authorization?
Guest post by Charith Ellawala, Co-Founder & CTO at Cerbos In the world of software development, authorization is one of the most important aspects to consider when designing any application. Without proper authorization, an application can become vulnerable...
October 13, 2023 | By Charith Ellawala

Only one label to improve your Kubernetes security posture, with the Pod Security Admission (PSA) — just do it!
Community Post Only one label to improve your Kubernetes security posture, with the Pod Security Admission (PSA) — just do it!
Community post originally published on Medium by Mathieu Benoit In Kubernetes 1.25 as stable (and since 1.23 as beta), the Pod Security admission (PSA) controller replaces PodSecurityPolicy (PSP), making it easier to enforce predefined Pod Security Standards (PSS) by simply adding a label to...
October 12, 2023