Filter & Sort
  1. Sweet Demo: Intelligent Vulnerability Prioritization Using AI and Runtime Insights

    Discover how Sweet Security cuts through vulnerability noise with runtime insights and AI-driven analysis, so you can prioritize real risks, reduce alert fatigue, and protect what truly matters.

  2. T-Mobile partners with Red Hat to automate network shift to cloud

    T-Mobile partners with Red Hat to automate its cloud shift, boosting network performance, reducing costs, and enhancing flexibility with OpenShift.

  3. Telecommunications Giant Sets the Stage for Scalable, Resilient, and Secure Software Development with JFrog

    Learn how this leading multinational telecommunications company transformed its entire development platform, and achieved scalability and optimal uptime by moving to the JFrog Software Supply Chain Platform in the cloud.

  4. Tempus Multi-Cloud Asset Inventory

    Discover how Tempus uses CloudQuery to manage multi-cloud environments at scale, leveraging GCP, Terraform, and Grafana for compliance monitoring and cloud security. Learn from their real-world deployment fetching resources across 80+ AWS accounts and 1000+ GCP projects.

  5. The 3 Es of Diskless Kafka BYOC

    Explore three ways to buy Kafka in the cloud—Multi-Tenant SaaS, Single-Tenant SaaS, and Bring Your Own Cloud (BYOC)—and discover why Diskless BYOC offers significant economic, enforcement, and enterprise discount advantages for organizations operating Kafka at scale, challenging traditional fully-managed solutions.

  6. The ABCs of website localization to build brand loyalty

    Unlock global brand loyalty! Discover the ABCs of website localization, from prioritizing content to mastering cultural nuance. Learn how DeepL and Weglot power high-quality, efficient translations, helping brands like REVIEWS.io and Bigblue boost traffic by 120% and conversions by 44%.

  7. The Challenges of Using Kubernetes at Scale

    Kubernetes is powerful but notoriously complex—especially at scale. From rising cloud costs to configuration drift, delayed upgrades, and multi-location inconsistencies, enterprises face major infrastructure challenges. This article explores how Talos Linux and Omni tackle these issues head-on by simplifying Kubernetes management, enhancing security, reducing cloud dependency, and eliminating fragility with an immutable, API-first OS and centralized control interface.

  8. The Cost of Doing Nothing: How Workflow Chaos Wastes 20+ Dev Hours a Month

    Is workflow chaos secretly costing your dev team 20+ hours a month? Discover how inconsistent PRs, endless merge conflicts, and slow onboarding silently kill velocity, and learn practical fixes to standardize your workflows for peak productivity and happier developers.

  9. The Current State of Cloud Security and the Transformative Impact of AI: Insights from DOT Security

    Understand the the impact of AI on cloud security and how DOT Security is making waves

  10. The Evolution of Public Cloud Providers: Key Innovations in 2024

    Discover cloud innovations and trends that shaped global business in 2024.

  11. The evolving role of cloud computing in IT investment

    This article examines how cloud computing's role in IT investment is changing. It focuses on how cloud infrastructure is becoming essential to digital transformation and how AI impacts this area.

  12. The four-eyes principle: what’s important in a DevOps world

    The four-eyes principle: what's important in a DevOps world. In this article we'll cover what it is and zoom in into some practical examples.

Items 349 to 360 of 421 total

Show per page