Filter & Sort
  1. Samsung SDS Cuts Database Costs in Half by Moving from Oracle to MariaDB

    Samsung SDS, a Samsung subsidiary, needed to modernize its Knox Portal, an internal collaboration platform with almost half a million users, by moving to a microservices architecture and open-source software. Facing high operating costs with Oracle, they migrated over 80% of their databases for this critical application to MariaDB Enterprise Server. This transition achieved zero-downtime upgrades, global real-time data synchronization, and a more than 50% reduction in operating costs, ensuring service continuity and stability for 80 Samsung affiliates worldwide. MariaDB's transparency and performance proved to be a cost-effective choice, enhancing developer and DBA capabilities.

  2. SAP and Microsoft Launch Joint Program to Accelerate Cloud ERP Adoption

    Modernise ERP with AI-driven agents, cloud-grade reliability, and partner-led adoption via SAP’s new program on Microsoft Cloud.

  3. Say Hello to AWS Cost and Usage Reports Integration and Report in CloudQuery

    CloudQuery announces its new AWS Cost and Usage Reports (CUR) integration—empowering engineering teams to analyze and optimize cloud spend directly from infrastructure data. Learn how to gain cost visibility, allocate budgets by tags or teams, and uncover hidden cloud expenses with powerful queries and dashboards.

  4. Scaling Docker Usage with JFrog

    Worried about Docker Hub rate limits? Discover how JFrog’s universal artifact manager and container registry ensures uninterrupted Docker usage by proxy caching, enabling authentication, and providing unlimited public Docker Hub downloads via JFrog SaaS, helping you scale seamlessly.

  5. Scaling Kubernetes the Right Way: Platform Engineering Lessons from Kubermatic

    Explore Kubernetes at scale with Kubermatic CEO Sebastian Scheele — platform engineering, AI integration, developer self-service, and open-source demo.

  6. Secure and Efficient Air-Gapped Deployments: A Devtron Approach

    Deploying to air-gapped Kubernetes clusters is complex and error-prone. Devtron’s Software Distribution Hub simplifies this by automating Helm chart delivery, using private registries and a Release Operator to securely manage and monitor deployments in air gapped enviornments.

  7. Secure and Scalable Kubernetes for Multi-Cluster Management

    Managing multi-cluster Kubernetes environments across clouds and data centers introduces complexity, security gaps, and observability challenges. This article explores how Calico Cluster Mesh provides seamless inter-cluster connectivity, fine-grained security policies, intelligent traffic management, and unified observability—empowering teams to build scalable, secure, and efficient Kubernetes architectures. Learn how companies like Box leverage Calico to enforce zero-trust security and simplify multi-cluster operations.

  8. Securing AI Agents with Just-in-Time Permissions: Permit.io on Agent Identity & Consent

    Permit.io CEO Or Weis introduces just-in-time permissions and ReBAC, showing how Agent Security enables safer, smarter AI agents.

  9. Securing Kubernetes Networking with TLS Encryption: A Comprehensive Guide

    Secure Kubernetes networking with TLS encryption. Importance of networking security and a step-by-step guide to implement TLS encryption for your cluster.

  10. Securing the Future: Sysdig on AI Threats, Falco, and Real-Time Cloud Defense

    Sergej Epp discusses AI-driven cloud threats, Falco’s evolution, and Sysdig’s latest innovations—offering insights and advice on real-time detection and response at KubeCon.

  11. Securing the Software Supply Chain with Anchore

    Explore top container security challenges with Alan Pope from Anchore in this KubeCon interview—insights on SBOMs, compliance automation, and modern DevSecOps workflows.

  12. Security Benchmarking Authorization Policy Engines: Rego, Cedar, OpenFGA & Teleport ACD

    In collaboration with Teleport, Doyensec has developed the Security Policy Evaluation Framework (SPEF) — a dynamic testing and benchmarking tool for evaluating the security, performance, and reliability of popular authorization policy engines like Rego, Cedar, OpenFGA, and Teleport ACD. Built with modular architecture and containerized execution, SPEF allows researchers and engineers to validate policies under consistent, controlled conditions. This article walks through its architecture, supported engines, and key insights from early testing across 27 threat-driven test cases.

Items 325 to 336 of 421 total

Show per page