Kerim Satirli returns to unpack HashiCorp’s latest: Terraform Stacks, Actions, Search, Infragraph, and Vault Radar, plus AI-agent rise and supply-chain threats like Shi Hulud attack.
Taylor Dolezal of Dosu.dev explores living documentation, open-source roots, AI-driven, context-aware knowledge, and Dosu’s fact-and-citation approach to unify fragmented tools for maintainers and enterprises alike.
GitKraken MCP uses AI and real project context to cut friction, reduce tool switching and turn your coding assistant into a true development teammate.
Formae transforms platform engineering with codification, replacing brittle YAML and JSON to create safer, faster infrastructure workflows.
Check Point unveils ThreatCloud NextGen, an AI-powered threat intelligence platform delivering real-time cyberattack prediction and prevention for modern enterprises.
Automate API security effortlessly with SecureBlink and protect your applications with continuous monitoring and smart vulnerability remediation.
Eric Herzog reveals how Infinidat revolutionizes enterprise storage with performance, resilience, simplicity, cyber-storage, AI automation, and scalable reliability to solve modern IT challenges for organizations.
Discover how Weaviate evolved into an AI-native database. CEO Bob van Luijt explains vector search, RAG, agents, and scalable open-source innovation.
Discover seven hidden complexities of cloud data management, including privacy, API limits, scale, vendor lock-in, latency, transformations, and AI compliance, and learn how CloudQuery simplifies them with secure, flexible, and AI-ready solutions.
Discover how WebAssembly overcomes the challenges of running serverless at scale. Learn about faster startups, lower costs, Kubernetes integration, and edge computing with WebAssembly.
Discover how Tigera’s Calico Whisker redefines Kubernetes network observability by providing policy-aware, context-rich insights into traffic flows for faster troubleshooting and stronger security.
Discover how Permit.io's just-in-time permissions and relationship-based access control solve unique authorization challenges for LLM agents.