Staff Post
A mid-year 2025 look at CNCF, Linux Foundation, and the top 30 open source projects
Building upon our previous analyses, we continue to monitor trends and technologies that resonate with developers and end users. Take a look at our past timeframes from our blogs. Here are the main takeaways I see...
July 18, 2025 | Chris Aniszczyk, CTO, CNCF
Found 2337 posts
Member Post
Top 5 cloud computing trends of 2024
Member post by Sameer Danave, Senior Director of Marketing, MSys Technologies Every time I think I have this whole technology game down to a science, something changes in the blink of an eye. And if you’re...
May 3, 2024
Staff Post
Is your supply chain secure? Double check with our framework
A secure supply chain is a critical piece of cloud native security, and it can be tricky to get right because it covers such a broad expanse of factors from code to pipelines and beyond. Join...
May 3, 2024
Member Post
Early explorations and practices of Xline, a stateful application managed by Karmada
Member post by DatenLord Background and Motivation More and more IT vendors are now embracing cross-cloud multi-clustering as cloud-native technologies and cloud markets continue to mature. Here’s Flexera’s mid-2023 survey on the cloud-native market’s acceptance of...
May 2, 2024
Member Post
Accelerating Machine Learning with GPUs in Kubernetes using the NVIDIA Device Plugin
Member post originally published on the SuperOrbital blog by Keegan McCallum NVIDIA Device Plugin for Kubernetes plays a crucial role in enabling organizations to harness the power of GPUs for accelerating machine learning workloads. Introduction Generative...
April 30, 2024
Community Post
FinOps for Kubernetes: engineering cost optimization
Community post by Saqib Jan Cloud has given on-demand access to compute resources, but high availability also makes cost a much more dynamic problem to forecast. This reverberates as companies continue to expand their cloud footprints...
April 29, 2024 | Saqib Jan
Member Post
The hidden economy of open source software
Member post originally published on Sysdig’s blog by Nigel Douglas The recent discovery of a backdoor in XZ Utils (CVE-2024-3094), a data compression utility used by a wide array of various open-source, Linux-based computer applications, underscores the importance...
April 26, 2024 | Nigel Douglas
Member Post
Open source software in AI and cloud trends to watch in 2024: thoughts from the Netris community
Member post originally published on Netris’s blog Let’s face it: The world of open source software can feel boring – in a good way. Open source has become so pervasive, and so deeply entrenched within modern...
April 26, 2024
Member Post
How Katalyst guarantees memory QoS for colocated applications
Member post originally published on Katalyst’s blog In the previous post[1], we introduced Katalyst – a QoS-based resource management system that helps ByteDance improve resource efficiency through colocation of online and offline workloads. In the colocation...
April 25, 2024
Community Post
A recap: KubeCon + CloudNativeCon Europe 2024
Community post originally published on Medium by Ryan Gough and Majid Attar This year, we (JYSK tech) took to Paris to attend KubeCon + CloudNativeCon Europe 2024. After three days of talks, networking and workshops. We...
April 23, 2024 | Ryan Gough + Majid Attar
Decoding your daily typing habits with GreptimeDB and Streamlit
Member post originally published on Greptime’s blog by Tison Nowadays, typing is a nearly daily occurrence for most people. Interestingly, your typing habits may vary significantly from what you might assume. Below, you’ll find a dashboard...
April 23, 2024
Community Post
KubeCon + CloudNativeCon 2024 recap: highlights and takeaways
Community post originally published on Medium by Maryam Tavakkoli This year, I had the opportunity to attend KubeCon + CloudNativeCon Europe in Paris. While this marked my second in-person KubeCon attendance, it was my first experience...
April 19, 2024
Project Post
Cloud Custodian completes audit to strengthen security posture and enable continuous assessment
Project post by Cloud Custodian maintainers The Cloud Custodian maintainers are happy to complete a successful security audit with Ada Logics. The Open Source Technology Improvement Fund (OSTIF) facilitated this audit, which was generously funded by...
April 19, 2024
Member Post
The challenges of rising MTTR — and what to do
Member post by Jake O’Donnell, Logz.io Data volumes are soaring. Environments are increasingly intricate. The risk of applications and systems encountering breakdowns is sky-high, and the mean time to recovery (MTTR) for production incidents is moving...
April 18, 2024
Project Post
Triton Server accelerates distribution of models based on Dragonfly
Project post by Yufei Chen, Miao Hao, and Min Huang, Dragonfly project This document will help you experience how to use dragonfly with TritonServe. During the downloading of models, the file size is large and there...
April 15, 2024 | Yufei Chen, Miao Hao, and Min Huang
Community Post
Streamlining logs with open source, local LLMs
Community post by Anup Ghatage Log messages are essential for debugging and monitoring applications, but they can often be overly verbose and cluttered, making it difficult to quickly identify and understand critical information. This is especially...
April 12, 2024
Ambassador Post
Charting new territory: OpenTelemetry embraces profiling
Ambassador post originally published on Logz.io’s blog by Dotan Horovits The topic of continuous profiling has been an ongoing discussion in the observability world for some time. I said back in 2021 that profiling was set...
April 11, 2024 | Dotan Horovits
Member Post
What is infrastructure from code?
Member post originally published on AppCD’s blog by Lauren Rother Maybe you’ve heard of Infrastructure as Code (IaC), which is the process of managing and provisioning computer data center resources (mostly but not entirely in the cloud) through...
April 10, 2024 | Lauren Rother
Member Post
K8s Benchmark Report: are organizations meeting NSA hardening checks?
Member post originally published on Fairwinds’s blog by Joe Pelletier The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) continue to update their Kubernetes hardening guidance, making recommendations to help organizations ensure they are hardening their Kubernetes...
April 9, 2024 | Joe Pelletier
Member Post
Applicability of Open Policy Agent (OPA) in telecom domain
Member post by Rakesh Girija Ramesan Nair, Senior Technology Architect, and Sherni Liz Samuel, Technology Architect, Infosys Limited Abstract: This blog brings forth the key focus areas & challenges in the Telecom domain related to policies...
April 8, 2024 | Rakesh Girija Ramesan Nair and Sherni Liz Samuel
Member Post
Membership change source code interpretation
Member post originally published on Medium by DatenLord Background In distributed system application scenarios, it is inevitable to add or delete nodes or replace nodes, the simplest solution is to temporarily shut down the cluster, then...
April 4, 2024 | DatenLord