SoftwarePlaza IT Magazine

Connecting people and technology through news, insights, and inspiration.
Filter & Sort
  1. Video
    Operationalizing AI: How Jozu Brings Machine Learning to Production

    Discover how Jozu simplifies secure AI/ML deployment as Brad Micklea shares insights on bridging data science, engineering, and operations with open source tools.

  2. Article
    Optimizing K8s Cost to Strengthen Competitive Advantage

    Discover how cybersecurity leader Cynet, with a focus on simplicity, leveraged PerfectScale to gain unprecedented visibility into pod costs, streamline Kubernetes cost optimization, and proactively identify and resolve resiliency issues across their multi-cluster AWS EKS environment, ensuring a stable and cost-effective solution for their customers.

  3. Article
    Oracle Commits $3 Billion to Boost AI and Cloud Infrastructure Across Europe

    Oracle plans a $3 billion investment in Germany and the Netherlands to boost AI and cloud infrastructure amid rising European demand.

  4. Article
    Over 269,000 Websites Compromised by Obfuscated JavaScript Malware in Stealth Campaign

    Over 269,000 websites were hit in a month with obfuscated JavaScript malware, redirecting users to malicious content in a global stealth campaign.

  5. Article
    Overriding variables in Terraform

    Sometimes, overriding variables in Terraform is needed for testing or using code outside its intended usage patterns. This article shows you how.

  6. Article
    OX Security: Empowering Executives with Actionable AppSec Insights

    Application security isn’t just a technical concern — it’s a business priority. OX Security’s enhanced executive reports help bridge the gap between AppSec teams and leadership by turning complex security data into clear, actionable business insights. With high-level summaries, dynamic visualizations, and tailored risk analysis, these reports empower executives to prioritize security investments and align AppSec strategies with business goals.

  7. Article
    PointFive’s 2025 Strategy

    PointFive enters 2025 with a bold vision: to scale FinOps through deep engineering engagement, multi-cloud maturity, and breakthrough automation. From real-time anomaly detection to AI-powered insights, PointFive is redefining how teams approach cloud cost optimization. Learn how we’re expanding our platform, deepening partnerships, and showing the world that saving money in the cloud can be powerful—and fun.

  8. Video
    Policies, Not Platforms: Practical Lessons for GitOps & DevEx Success

    Steve Fenton reveals Octopus research insights on platform adoption, GitOps, Argo, and metrics shaping successful, secure engineering platforms.

  9. Article
    PostgreSQL® extensions you need to know in 2025

    Uncover the pivotal role of PostgreSQL's extensions ecosystem, its historical context, and why it remains indispensable for modern data needs, including AI and analytics. Dive into key extensions like TimescaleDB, PostGIS, and pgvector, and learn how a managed service, like Aiven, mitigates risks and enhances reliability.

  10. Article
    Practical advise for DevSecOps, its just DevOps with strings attached

    With the rise in interest in security, the DevOps world is looking to integrate security into their processes. Here's how you DevSecOps.

  11. Article
    Practical AI security in multi-cloud environments

    As organizations rapidly adopt generative and agentic AI tools across multi-cloud environments, securing those systems has never been more critical. This article explores the key challenges of AI security—such as visibility gaps, runtime threats, and compliance pressures—and outlines best practices for building a strong AI security posture. From continuous monitoring with Falco to managing AI-specific risks with frameworks like MITRE ATLAS and OWASP AI, learn how to protect your AI infrastructure against evolving threats and regulatory demands.

  12. Article
    Private Tunnels: Benefits and Setup for Businesses

    Unmask the power of private tunnels! Discover how these secure passageways encrypt data, mask IPs, and leverage intrusion prevention for ultimate online privacy. Learn their benefits, setup essentials, and how solutions like Netmaker elevate network security for businesses.

Items 349 to 360 of 485 total

Show per page