As with the rest of the technology landscape, artificial intelligence – and in particular, agentic AI – came to dominate the conversations at the Cloud Native Computing Foundation’s recent flagship ...
Eric Marchewitz is a field solution architect with a 23-year career in cybersecurity solutions, working for such companies as PGP Security, McAfee, Cisco and Check Point. He is a recovering CISSP and ...
Simply running an application on a remote server doesn’t make it cloud-native. It’s about specific design principles for scalability and resilience. Cloud-native applications are increasingly the ...
Cloud-native technologies have taken centre stage ever since they were introduced. They have reshaped the landscape of application development, delivery, and operations, creating a new competitive ...
Trilio, a leading provider of cloud-native data protection and disaster recovery solutions, announced it has achieved ...
The objections raised today by enterprise SaaS loyalists against emerging AI-native agentic applications sound a lot like the ...
Containers and micro services may not be a new concept at this point, but lots of companies are struggling with the transition to cloud native applications, and the impact of that approach on their ...
Enabling your existing “pre-cloud” enterprise applications to take full advantage of cloud computing is fraught with technical obstacles, such as unsupported versions of operating systems (OS), ...
For public health, cloud-native scientific computing delivers the security and simplicity needed for the path from ...
Building secure, resilient, and scalable cloud-native applications requires a new set of best practices that diverge from traditional application development. Start with these six. The emergence of ...
At this point, most organizations have accepted that securing their cloud environments is a priority. But adopting that accepted wisdom is not enough. Even if 95% of organizations claim to be ...
The news headlines are full of breaches and data exposures that are the result of unsecured cloud-native applications and application programming interfaces (APIs) — how, for example, third-party data ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results