On March 16, the Federal Risk and Authorization Management Program (FedRAMP) released supplemental requirements for vulnerability scanning of containers. FedRAMP provides a standardized approach to security assessments for cloud offerings for all federal agencies....
In my previous blog posts, I’ve been talking about containers themselves quite a bit and touched on orchestration (how containers are managed). Let’s now dive a bit into Kubernetes and discuss what’s inside that black box called a Kubernetes Cluster. This will...
In my last post, we described Virtual Machines (VM’s) and containers using real-world analogies of houses and apartments. In this post, we’ll continue to reference those analogies, but dive deeper into the technical differences in order to understand the advantages...
In our Cloud Native Practice, we run workshops for our clients covering topics ranging from the basics of containers or the cloud to analyzing deployment processes and migration strategies. These workshops are customized to clients’ needs and generate interesting...
Pick your metric, Mean Time to Detect, Mean Time to Recover/Resolve… your choice. The key really is to detect early, resolve/recover quickly, and keep your customers happy. The trick to doing that is getting the right information at the right time. Bad or incomplete...
There are recent articles, including a paper published in the scientific journal Nature discussing that Neanderthals could regularly start fires using flint. The movie, A Quest for Fire (1981) explores what happens when a tribe lost their fire before the time of the...
Start your digital transformation with a consultation with one of our expert engineers. We'll recommend solutions based on your technical and business challenges.