Kubernetes is an opensource platform for automating deployment, scaling, and management of containerized applications. According to the data from GitHub, Kubernetes represents one of the largest opensource projects worldwide, and the development and deployment of tools around Kubernetes is rapidly and continuously growing. This rapid and continuous evolution makes Kubernetes an unsteady, fastmoving target, in particular regarding security.
Last week Dan Kohn, the former executive director at Cloud Native Computing Foundation (CNCF), died quite to early as a result of colon cancer.
We thank him for his long-term engagement for open source, for boundless collaboration and the Public Health Initiative of the Linux Foundation and his former dedication in several organizations and foundations.
By enabling a long-held dream of computing as utility, Cloud Computing has become one of the major technology trends in the last decade. Due to its’ flexible and agile nature, Cloud Computing is continuously and significantly transforming a large part of the IT industry.
Clouds are replacing traditional corporate data centers. More and more companies are connecting the computing power of external providers instead of managing their own pool of physical servers.
Why do successful businesses move to clouds? Short answer: to cut costs and speed up growth. In more detail, let’s consider the main factors that push businesses to move to cloud services and the arguments in favor of the cloud.
Over the past 18 months, containers have taken most organizations by storm. Containers and microservices are key enablers in organisations’ quests for digital transformation. But, they increasingly need to adopt a smart cloud security strategy based around a Container Security Triad.
The OpenStack Foundation’s virtual OpenDev event this summer created a space for engaging conversations on a variety of topics within the open infrastructure community. Packaged into three separate events, each three days in duration, participants discussed open infrastructure software, hardware automation and containers in production. In the first session, Blizzard Entertainment, Verizon, and OpenInfra Labs discussed combatting the challenges behind scaling, testing and integration during their presentations to the open source community.
Cloud computing has long been the way to go for digital-savvy business owners, but the current health crisis has accelerated the need for all businesses to adopt a flexible, cloud-first framework. Adopting the right technology helps keep your business agile while ensuring that employees stay productive. This article outlines how cloud computing and employee productivity are closely linked, with a focus on tighter security protocols, the creation of efficient workflows, and scalability.
The following article describes an example of how a real-world “As A Service”-infrastructure was designed and deployed from scratch. It covers different aspects of running multiple assets in form of service offerings, e.g. virtual machines, containers or microservices. Therefore, EWERK describes their journey from a blank page to production and how they solved challenges like scalability, reliability and performance. This is meant for everyone who wants to understand platform design principles and what to consider before getting started as well as after take-off.
In an era of transformation, speed and agility of application infrastructure is key
Unfortunately, it can take IT weeks to deliver new application stacks when requested because of manual hand-offs across a fragmented set of ‘software-definable’ technologies on-premises. This inefficiency leads teams to bypass IT in favor of public cloud application services which raises cloud costs and opens security holes.
The cloud report conducted five short interviews with five people from the cloud and container technology environment and asked five questions. The fives interview was with Simon Pearce, Product Owner and Team Lead at SysEleven.
Read the interview here
The cloud report conducted five short interviews with five people from the cloud and container technology environment and asked five questions. The fourth interview was with Brent Schroeder, CTO of SUSE
Read the interview here
The cloud report conducted five short interviews with five people from the cloud and container technology environment and asked five questions. The third interview was with Markus Eisele, Developer Adoption Program Lead EMEA, Red Hat
Read the interview here
The cloud report conducted five short interviews with five people from the cloud and container technology environment and asked five questions. The second interview was with Hendrik Land, Solutions Architect at NetApp.
Read the interview here
The Cloud Report conducted five short interviews with five people from the cloud and container technology environment and asked five questions. The first interview was with Julian Hansert, COO at Kubermatic.
Read the interview here
If you are willing to accelerate your cloud business, you will most likely be looking at setting up automated pipelines and on automating at least parts of your operations. What if I told you this already exists – and it frees you from handling it yourself?
Interested? Read on!
Some time ago, I learned an important Kubernetes lesson the hard way. The story begins with Kubernetes Operators, which is a method of packaging, deploying, and managing a Kubernetes application. The thing I tripped up on was garbage collection in the cluster, which cleans up objects that no longer have an owner object (but more on that later)…
G-Core Labs has its own cloud infrastructure spanning 5 continents. Thousands of clients worldwide use G-Core Labs services. Such coverage allows G-Core Labs to both see the global picture and analyze data by region and country. Unlike previous years when we usually see a decrease in web activity at the end of winter, the situation this year was reversed. The highest traffic increase for April was observed in North America and Europe where total traffic consumption grew by 33 % and 18 %, respectively, during the pandemic. In Latin America, the network load increased by 12 % since the beginning of the year.
The topic of security can often be a difficult discussion at many companies. There are many competing demands to satisfy all at the same time. How do we increase developer productivity, satisfy regulatory requirements, ensure production stability, and detect and remediate threats in real time? The answer won’t be simple, but because of advances in cloud-based technology there are some thought processes that are quickly becoming outmoded.
How we could deal with changing situations
The current situation forces a lot of people, companies and other organizations to change their work processes, tools, collaboration models, and the mindset. Home-office and mostly virtual contacts not only affect the work situation, but also the mental conditions. I had the opportunity to talk to a mental and somatic coach who is dealing with all these aspects in her daily professional life:
Today the SUSECONdigital 2020 starts! Upfront the cloud report interviewed Melissa di Donato. Have a spectacular SUSECON.
SUSE prides itself as the largest independent open source company in the world. With the appointment of Melissa di Donato to CEO in August 2019, SUSE started a new chapter and put itself on the path to global growth. In this interview, Melissa explains how her style of leadership matches perfectly with the vision of open source, the role of women in tech leadership and how fierce collaboration inspires SUSE and its customers.
This article gives a short overview of the Gaia-X project as next generation cloud computing: with motivation for the project, what is Gaia-X?, project organization, role of civil society and prospects.
Interview with data journalist Sebastian Vollnhals
The first time I encountered a password was when my four years older sister tried to prevent me from entering her secret play bunk. Upsettingly enough she didn’t give the password to me and I was locked out. As an adult however, I use passwords every day for many purposes: logging into accounts, retrieving my emails, accessing applications, databases, networks, websites, and also my subscriptions. Moreover, this is the case for every typical computer user.
CI/CD stands for Continuous Integration / Continuous Delivery and depicts an approach where software is built and deployed whenever a check-in into a source code repository is executed. This allows for a central build process, central storage of generated artifacts and centrally executed tests. The idea sounds simple, understandable and obvious. But it isn’t, at least not from an executional point of view, since there is more to it in modern application- and cloud-native environments.
An Interview with Chip Childers
Chip Childers is the cofounder of the Cloud Foundry Foundation and has been its Chief Technology Officer since 2016, now he is the Executive Director of the Foundation. During his visit in Berlin, we had the opportunity to meet up with him and get insight into the organization. What are they up to and what is to come?
The need of more efficient and secure processes is growing steadily, both in present times and for the future. no kind of digitization, or even digitalization, can successfully be performed if processes are not defined. But why is the optimization of processes so critical, and why are we in need of secure processes for information security?