|
You are here |
www.groundcover.com | ||
| | | | |
www.styra.com
|
|
| | | | | Build a solid understanding of how to secure Kubernetes along with some best practices. Learn how to secure nodes, clusters and pods. | |
| | | | |
sookocheff.com
|
|
| | | | | Most new applications are built as a single codebase and deployed as a monolith until product-market fit or the need for additional scale is required. Such monolithic applications are easy to write and maintain, and allow you to iterate quickly when there are a smaller number of users and the traffic is low. However, as traffic increases you will need to scale the application to handle the increase in load. One framework for scaling is the "Scale Cube" describe by AKF partners. | |
| | | | |
www.buoyant.io
|
|
| | | | | eBPF is cool technology with a lot to offer the cloud native world. It's been a popular choice for the CNI layer of Kubernetes clusters thanks to projects like Cilium. Service meshes like Linkerd are often deployed with CNI layers like Cilium, combining Linkerd's powerful L7 processing with Cilium's ... | |
| | | | |
www.shuttle.rs
|
|
| | | How we improved the Shuttle MCP server to make AI agents more reliable, with better error handling and context for seamless deployment workflows | ||