Filter & Sort
  1. How to Turn Your SBOM Into a Supply Chain Security Powerhouse with Anchore

    Turn SBOMs into a security advantage with Anchore’s Bring Your Own SBOM, Anchore Rank, and automation to boost supply chain visibility and risk management.

  2. Talos + Omni vs. Traditional Platforms: A Cost Comparison for Kubernetes at Scale

    Compare Talos + Omni with managed Kubernetes for true TCO, efficiency, and risk insights. Learn when this approach saves and when it doesn’t.

  3. How Navicat 17.3 Leverages AI Models in Database Management Systems

    Discover how Navicat 17.3 uses multi-model AI to optimize queries, explain SQL, and boost productivity in modern database management.

  4. Policies, Not Platforms: Practical Lessons for GitOps & DevEx Success

    Steve Fenton reveals Octopus research insights on platform adoption, GitOps, Argo, and metrics shaping successful, secure engineering platforms.

  5. Leverage PerfectScale to Handle GPU Utilization Optimization Challenges

    Boost GPU utilization without extra hardware. Learn how visibility, quick wins, smarter scheduling & PerfectScale automation cut costs & waste.

  6. Running LLMs on Kubernetes: From GPU Bottlenecks to Reliable, Production-Grade Inference

    Abdel Sghiouar explores Kubernetes’ evolution, from enterprise adoption to GenAI workloads, highlighting hardware challenges, operational hurdles, and community-driven innovations.

  7. How Akamas IO Uses AI to Unlock 50–90% Cloud Cost Savings with Continuous Optimization

    Discover how Akamas helps enterprises cut costs, boost reliability, and optimize continuously with AI-driven configuration tuning across workloads.

  8. The Rise of Tray.ai: Powering Agentic AI Workflows for Scalable Automation

    Discover how Tray.ai’s Merlin powers agentic AI workflows, enabling LLMs to think and act with context, governance, and scalable automation.

  9. How MariaDB Is Redefining Database Security in the Zero-Trust Era

    MariaDB helps businesses to redefine their database security in the zero-trust era by providing advanced features like encryption, granular access control, and continuous auditing to verify every request and secure data from internal and external threats.

  10. From Kubernetes Costs to AI Bot Wars – Why Serverless Needs WebAssembly

    Discover Fermyon CEO Matt Butcher’s insights on serverless at scale, WebAssembly’s cost and speed advantages, AI-driven challenges, and the CNCF Spin project’s future.

  11. How Cerbos Uses Zero-Trust to Defend Against Non-Human Identity (NHI) Threats

    ​​Learn how Cerbos secures non-human identities with real-time, zero-trust authorization and a stateless, standards-based approach.

  12. From Crashes to Complete Mobile Observability – Instabug on App Quality Beyond Bug Reporting

    Instabug’s Mahmoud El Magdoub reveals why mobile teams must expand beyond crash reporting to embrace holistic app quality monitoring.

Items 13 to 24 of 344 total

Show per page