Filter & Sort
  1. Get the evil out – don’t run containers as root

    When containers entered the stage, by default they ran as root. This poses a security risk. Get the evil out - don't run containers as root.

  2. Grafana brings great Kubernetes observability with the added bonus of cost optimization

    Grafana aims to make observability easy by providing tools to get started easily, blend Kubernetes best practices with Grafana Cloud features, and build custom dashboards for precise Kubernetes needs.

  3. Great guidelines for successful Bug Bounty programs

    Bug bounty programs offer a great way to let the community find vulnerabilities. Great guidelines for successful Bug Bounty programs.

  4. How BarTender Can Help Meet the Needs of Barcode Design to Improve Quality Control

    See how BarTender helps manufacturers design barcodes, detect defects, and improve quality control with smart labeling and automation.

  5. How Cerbos Uses Zero-Trust to Defend Against Non-Human Identity (NHI) Threats

    ​​Learn how Cerbos secures non-human identities with real-time, zero-trust authorization and a stateless, standards-based approach.

  6. How Chaos Genius’ Data FinOps solution optimizes for cost and performance

    Learn how to use Chaos Genius to overcome challenges of over-provisioned resources and legacy data stores.

  7. How data centers and edge devices have evolved over the years

    Data centers and edge devices have experienced significant changes in the ever-evolving field of technology, indicative of the changing needs of contemporary computing, the emergence of cloud computing, and the increasing significance of edge computing.

  8. How does NIS2 help beyond compliance

    Achieve NIS2 compliance to boost reputation, trust, and market edge. Strengthened cybersecurity practices attract clients and ensure long-term success.

  9. How Internal Developer Platforms integrate the DevOps pipeline end-to-end

    Learn how IDPs create a cohesive, efficient DevOps pipeline that enhances collaboration, improves software quality, and accelerates delivery times​.

  10. How MariaDB Is Redefining Database Security in the Zero-Trust Era

    MariaDB helps businesses to redefine their database security in the zero-trust era by providing advanced features like encryption, granular access control, and continuous auditing to verify every request and secure data from internal and external threats.

  11. How Nutanix helps architect & manage hyperconverged cloud infrastructure

    Simplify multi-cloud management with Nutanix HCI. Discover how it streamlines operations, boosts security, cuts costs, and prepares businesses for future tech.

  12. How Spacelift Can Improve Your Infrastructure Orchestration

    Discover how Spacelift enhances infrastructure orchestration by streamlining complex workflows, improving governance, and increasing developer velocity. This guide covers Spacelift’s key features—from automated IaC workflows and policy-based access control to drift detection, resource visualization, and self-service infrastructure. Learn how Spacelift helps platform and DevOps teams manage Terraform, Pulumi, Kubernetes, and more with robust security, flexibility, and scalability.

Items 37 to 48 of 88 total

Show per page