Building a Numbers Station That You Can CallNumbers stations, once shrouded in cold war mystery, are back — but now you can call them. You can build your own using the cloud: No…Oct 12, 2024Oct 12, 2024
Unleashing the T-Rex: How Containers Sometimes Fail to ContainIn Jurassic Park, the electric fences were supposed to keep the dinosaurs locked in, but as we all know, things didn’t exactly go as…Sep 23, 2024Sep 23, 2024
Shifting Left: The Key to Saving Time, Money, and Securing Software DevelopmentBusiness agility, time to market, and other such buzzwords are all over the place as organizations strive to deliver software faster…May 30, 2023May 30, 2023
From the Outside In: How I Uncovered the Cybersecurity Failures of Thousands of CompaniesMany businesses are failing to properly secure sensitive information, leaving it vulnerable to cyber-attacks and data breaches.Jan 23, 2023Jan 23, 2023
Using eBPF to solve problems that sidecars can’t in cloud-native deploymentsAlthough sidecars have gained a lot of traction over the past five years, eBPF is challenging its position.Jan 13, 2023Jan 13, 2023
Installing Istio Service Mesh in OpenShift Local with HelmI put together a step-by-step guide about getting up and running with Istio service mesh on Red Hat OpenShift Local (formerly Red Hat…Dec 10, 2022Dec 10, 2022