20 Developers and Kubernetes Experts Reveal the Biggest Mistakes People Make During the Transition to Kubernetes

20 Developers and Kubernetes Experts Reveal the Biggest Mistakes People Make During the Transition to Kubernetes

Making the transition from virtual machines to containers is a complex process that can take some time, particularly for larger, more complex environments. Users are drawn to Kubernetes’ container-centric environment, as well as its ability to enable portability across infrastructure providers. Kubernetes also offers broad applicability; for the most part, ... Read More
Kubernetes 101 Workshop: Deploying a Simple Web App onto Kubernetes

50 Useful Kubernetes Tutorials for IT Professionals

Technologies like Docker have made it easier to continuously deploy applications across any number of host servers. They eliminate the need for having your own virtual machine because all the code and configuration settings you need to run your app is packaged into one container. Google created Kubernetes to automate ... Read More
Kubernetes 101 Workshop: Deploying a Simple Web App onto Kubernetes

50 Useful Kubernetes Tutorials for IT Professionals

Technologies like Docker have made it easier to continuously deploy applications across any number of host servers. They eliminate the need for having your own virtual machine because all the code and configuration settings you need to run your app is packaged into one container. Google created Kubernetes to automate ... Read More
Introducing Threat Stack’s New Podcast: “Your System Called”

Introducing Threat Stack’s New Podcast: “Your System Called”

That’s right. The tl;dr is that Threat Stack is launching a podcast series called Your System Called — and I’ll be hosting it. You can access the podcast on iTunes, subscribe via RSS, or preview the first two episodes below. What’s the goal of the show? Cloud infrastructure is changing, ... Read More
Introducing Threat Stack’s New Podcast: “Your System Called”

Introducing Threat Stack’s New Podcast: “Your System Called”

That’s right. The tl;dr is that Threat Stack is launching a podcast series called Your System Called — and I’ll be hosting it. You can access the podcast on iTunes, subscribe via RSS, or preview the first two episodes below. What’s the goal of the show? Cloud infrastructure is changing, ... Read More
A Deep Dive Into Secrets Management

A Deep Dive Into Secrets Management

There’s a lot to think about when it comes to working with containers, Kubernetes, and secrets. You have to employ and communicate best practices around identity and access management in addition to choosing and implementing various tools. Whether you’re a SecOps professional at a startup, small business, or large enterprise, ... Read More