SoftwarePlaza IT Magazine

Connecting people and technology through news, insights, and inspiration.
Filter & Sort
  1. Article
    How Tigera’s Calico Whisker Is Redefining Network Observability

    Discover how Tigera’s Calico Whisker redefines Kubernetes network observability by providing policy-aware, context-rich insights into traffic flows for faster troubleshooting and stronger security.

  2. Article
    Build a New Approach to Identity and Access Control for LLM Agents with Permit.io

    Discover how Permit.io's just-in-time permissions and relationship-based access control solve unique authorization challenges for LLM agents.

  3. Video
    Beyond YAML: The Future of Platform Engineering with Formae

    Discover how Formae redefines platform engineering—replacing YAML/JSON with smart abstractions that boost collaboration, reliability, and speed in infrastructure management.

  4. Video
    Operationalizing AI: How Jozu Brings Machine Learning to Production

    Discover how Jozu simplifies secure AI/ML deployment as Brad Micklea shares insights on bridging data science, engineering, and operations with open source tools.

  5. Article
    How to build and scale agentic systems efficiently with Akka.io

    Learn how to build and scale agentic AI systems efficiently with Akka.io, using real-world cases, design patterns, and self-improving AI vision.

  6. Article
    7 Platform Engineering Lessons from Kubermatic on Scaling Kubernetes

    Discover platform engineering lessons from Kubermatic on scaling Kubernetes, simplifying operations, and preparing for future workloads like AI.

  7. Article
    10 Benefits of Using AI in a Private Cloud with Civo

    Discover the top 10 benefits of using AI in a private cloud with Civo FlexCore AI, blending performance, security, and complete control for scalable, compliant AI innovation.

  8. Video
    Cut the Noise: Runtime Vulnerability Prioritization with Upwind

    Discover how Upwind’s eBPF-powered runtime context reduces scan noise, detects live exploits, and strengthens cloud-native security for DevOps teams.

  9. Video
    From Zanzibar to SpiceDB: Rethinking Access Control at AuthZed

    AuthZed CEO Jake Moshenko unpacks relationship-based access control, explaining SpiceDB’s Zanzibar roots, fine-grained policy modeling, and how treating auth as data improves scale, caching, and agility.

  10. Article
    6 Ways to Detect Zero-Day Threats and Reduce False Positives with Check Point

    Discover how Check Point’s AI-driven WAF detects zero-day threats and reduces false positives through 7 innovative approaches to application security.

  11. Article
    Talos + Omni vs. Traditional Platforms: A Cost Comparison for Kubernetes at Scale

    Compare Talos + Omni with managed Kubernetes for true TCO, efficiency, and risk insights. Learn when this approach saves and when it doesn’t.

  12. Article
    How Navicat 17.3 Leverages AI Models in Database Management Systems

    Discover how Navicat 17.3 uses multi-model AI to optimize queries, explain SQL, and boost productivity in modern database management.

Items 25 to 36 of 176 total

Show per page