spot_imgspot_imgspot_imgspot_img

Operations

The Importance of SBOM for Cloud-native Security and How You Can Get Started

When it comes to the modern-day software supply chain, the amount of complexity is almost baffling. As a consequence, the past few years have been marred with several high-profile security breaches, including the infamous hacking of SolarWinds. These types and magnitudes of supply chain attacks have prompted organizations and...

What the Broadcom-VMware deal means for the cloud computing industry

VMware is a leading provider of multi-cloud services that includes cloud management, application modernization, networking, cloud infrastructure, security, and remote workspaces, forming a flexible, consistent digital foundation. Broadcom is a global technology conglomerate that offers a range of products such as storage and networking devices, chips, and sensors. Broadcom...

Make non functional requirements practical – here’s how

Software applications and IT systems need to adhere to the demands and wishes of their end-users. Otherwise, they won't be used by them or they can disrupt the business in which they operate. Functional requirements describe which capabilities the system must support in terms of desired features. For example...

Benefits when applying the 12 Factor App principles (part 3)

The story of the benefits of the 12 Factor App principles continues in part 3 of our articles. In our last article, we'll zoom in into disposability, runtime environments, logs, and admin processes. Benefits when applying the 12 Factor App principles (part 3) Factor 9: Disposability Cloud-native applications should only run...

Benefits when applying the 12 Factor App principles (part 2)

In our previous article, you can read bout the first principles. We'll continue our journey to explore the most appealing advantages of 12 Factor Apps over traditional apps. Benefits when applying the 12 Factor App principles (part 2). Factor 5: Build, release, run Every application that follows a DevOps specific SDLC...

Benefits when applying the 12 Factor App principles (part 1)

Developers all around the world adopt one or more topics that together form the 12 Factor App principles. They already changed the way they build their software. Since this has great advantages in the cloud-native ecosystem, those companies they work for manage to push features faster and more reliable....
00:30:31

Video interview: Mirantis Lens is the Kubernetes IDE you didn’t know you needed

Edward Ionel talks about how Mirantis Lens unifies Dev & Ops around Kubernetes workflows. With unique features, a wide user base, and great flexibility, Lens is sure to ease your Kubernetes operations.
00:37:29

Video interview: Upbound enables a developer self-service experience

Crossplane is a CNCF incubating project that allows organizations to build an internal platform on top of Kubernetes. Upbound is based on Crossplane and simplifies this entire process. Tune in as Grant Gumina gives us the essentials of this entire approach and why it's gaining rapid adoption.
00:45:00

Video interview: 4 steps to zero trust security; Users, Devices, Location and MFA with Gill Langston at JumpCloud

Listen in as Gill Langston, Senior Product Manager at JumpCloud distills the most important ideas around directory management, IAM, SSO, and device management. He addresses the risks, common pitfalls, and best practices you can use as you look to make your enterprise systems inherently secure. Some key ideas from...
00:29:38

Video interview: Orca Security is pioneering agentless security for the cloud

Andrew Bartlam, VP EMEA Sales, Orca Security, sheds light on Orca's approach to cloud security. He explains what is agentless security, context-aware security, side scanning, and more. If you have questions related to this topic, feel free to book a meeting with one of our solutions experts, mail to sales@amazic.com.