BLOG

Insights empowering your cloud and network

Top picks

Thumbnail of an article about The benefits of Pod Security Policy — a use case
CLOUD

The benefits of Pod Security Policy — a use case

In the previous post I looked at how security is handled in Kubernetes. Let’s now see how it works in practice. One of the most powerful controllers is the Pod Security Policy admission controller (PSP). PSP is a cluster-level security mechanism that enables control over sensitive aspects of pod specification. It allows you to define a set of conditions a pod must meet in order to be accepted into the system.The following use case illustrates how it works. Let’s assume that we have a shared file system
Thumbnail of an article about Six reasons you may need a Managed Cloud Service Provider
CLOUD

Six reasons you may need a Managed Cloud Service Provider

According to Forrester data, 2019 will be the year when companies begin moving their core apps and operations into the cloud. As many companies have already seen, there are numerous benefits of cloud transformation and multiple vendors to choose from. According to RightScale, a full 91% of companies already use public cloud, 72% have used a private cloud and 58% of companies employ a multi-cloud strategy. With 91% of the organizations surveyed by CompTIA using some form of cloud computing, it is safe to say that companies are getting more and more cloud-reliant.
Thumbnail of an article about Kubernetes: what is it and how you can use it (part 1/2)
CLOUD

Kubernetes: what is it and how you can use it (part 1/2)

Kubernetes is an open-source system for container orchestration enabling automated application deployment, scaling and management. Read this two-part blog post to understand the business perspective on Kubernetes. I will present a brief story of virtualization methods, the key concepts on which Kubernetes is built and how it can help your business when it comes to running containerized applications. The second part covers six main reasons to adopt Kubernetes. First, let’s take a look at the market data on the adoption of Kubernetes.
Thumbnail of an article about How to use NVIDIA GPUs with Kubernetes — CodiLime approach
CLOUD

How to use NVIDIA GPUs with Kubernetes — CodiLime approach

The combination of NVIDIA GPUs, to allow computing power to be harnessed, and Kubernetes, responsible for managing containerization, may seem like a perfect marriage of two complementary tools, and an obvious solution. Yet, at the technical level, this combination, like many marriages, turned out to be more tricky than might have been expected. Read this blogpost to find out how CodiLime managed to find a way to deal with this matter. Let’s introduce the main characters then: NVIDIA GPUs (Graphic Processing Units) are powerful tools used to accelerate computationally-intensive tasks.
Thumbnail of an article about Debugging Nginx Ingress in Kubernetes — a study in (Codi)Lime  
CLOUD
NETWORKS

Debugging Nginx Ingress in Kubernetes — a study in (Codi)Lime  

This story comes with everything one needs to tell the perfect noir detective story. There’s an investigation, a mysterious victim and a silent psycho mass-murderer. Only the setting is changed, with Kubernetes clusters instead of Victorian era London and the CodiLime team smoking Sherlock Holmes’ pipe. So pour yourself some whiskey, light up a cigar and enjoy your reading! Kubernetes is currently one of the most popular open-source systems for deploying and managing applications. Yet it wouldn’t be so useful without Ingress, a tool that enables the outer world to contact the components within Kubernetes by using HTTP or an HTTPS protocol.
Thumbnail of an article about Sharing configuration between your CI, build and development environments
OPERATIONS

Sharing configuration between your CI, build and development environments

This post is a follow-up to our presentation at the OpenStack Summit in Berlin, where we discussed maintaining a unified CI and building pipelines using the open source CI system, Zuul. You’ll find a recording of the talk here and a related OpenStack Superuser writeup here. I thought it would be useful for some of you to expand the concept of unifying environments and to include also the development one. I will also explain why this may help you ensure your project is progressing smoothly. DevOps practitioners are always on the lookout for ways to optimize and bulletproof their development workflows.
Thumbnail of an article about What is ZFS and how can I use it?
OPERATIONS

What is ZFS and how can I use it?

You have probably heard about ZFS. But perhaps you are still wondering what all the fuss is about, what it is exactly and how to use it. I’ve been using it for the past 3 years, so I hope I can help you understand how you can benefit from it. In a nutshell, ZFS is a combined filesystem and logical volume manager. It is intended, first and foremost, to maintain data integrity, but also to protect data from the hardware and from the user and simplify storage administration. ZFS was created at Sun Microsystems and open-sourced as part of OpenSolaris.
Thumbnail of an article about SDN Security: Five reasons SDN is more secure than legacy networks
NETWORKS

SDN Security: Five reasons SDN is more secure than legacy networks

Great malware infections hit hard in 2017, leading to new cybersecurity concerns. As malware evolves, so too do networks and SDN and NFV solutions, which may be a good response to increasing threats. Let's talk about SDN security. According to the Cisco Annual Cybersecurity Report 2018, WannaCry and NotPetya were the most devastating ransomware attacks launched in 2017. WannaCry spread throughout institutions, including the Spanish telecom Telefonica, FedEx and Deutche Bahn while NotPetya hit Ukrainian banks, companies and the international logistics giant Maersk.
Thumbnail of an article about Do you even Zuul? CI system reloaded
OPERATIONS

Do you even Zuul? CI system reloaded

When we first started, we were given two things to do: resolve issues with builds getting gradually slower and set up a completely new system that Tungsten Fabric could use. Over the years, Tungsten Fabric has received commits from more than 500 contributors and the code is scattered across over 50 repositories. The entire project consists of over 2 million lines of code, written mostly in C++ and Python. In the beginning of the project few major tasks emerged: prepare the CI for the increased involvement of the community;
Thumbnail of an article about Webpack 3 to webpack 4: tips on migrating
SOFTWARE DEVELOPMENT

Webpack 3 to webpack 4: tips on migrating

Having heard a lot about speed improvements, we recently migrated from webpack 3 to webpack 4. The results have been astonishing: our average build time improved by 30%, and hot-reloading by 83%! This article covers the following topics:1. The key benefits of migration2. How webpack 3 compares to webpack 4 in terms of build time3. How to effectively migrate from webpack 3 to webpack 44. The pitfalls to avoidI’ll start by saying our project is humongous, so builds are pretty slow. Our hot-update recently got so slow, in fact, that we decided something had to be done.
arrow

Explore tech-packed content

Thumbnail of an article about Introducing SONiC-DASH for enhanced network programmability

Introducing SONiC-DASH for enhanced network programmability

on Apr 15, 2024
Thumbnail of an article about The crucial role of machine learning metadata and its influence on content embeddings

The crucial role of machine learning metadata and its influence on content embeddings

on Apr 9, 2024
Thumbnail of an article about Frontend security: API’s key risks and how to mitigate them

Frontend security: API’s key risks and how to mitigate them

on Apr 3, 2024
Thumbnail of an article about IIFE: a (wrongfully?) forgotten JavaScript pattern

IIFE: a (wrongfully?) forgotten JavaScript pattern

on Mar 28, 2024
Thumbnail of an article about Introducing SONiC-DASH for enhanced network programmability

Introducing SONiC-DASH for enhanced network programmability

on Apr 15, 2024
Thumbnail of an article about The crucial role of machine learning metadata and its influence on content embeddings

The crucial role of machine learning metadata and its influence on content embeddings

on Apr 9, 2024
Thumbnail of an article about Frontend security: API’s key risks and how to mitigate them

Frontend security: API’s key risks and how to mitigate them

on Apr 3, 2024
Thumbnail of an article about IIFE: a (wrongfully?) forgotten JavaScript pattern

IIFE: a (wrongfully?) forgotten JavaScript pattern

on Mar 28, 2024
Thumbnail of an article about Introducing SONiC-DASH for enhanced network programmability

Introducing SONiC-DASH for enhanced network programmability

on Apr 15, 2024
Thumbnail of an article about The crucial role of machine learning metadata and its influence on content embeddings

The crucial role of machine learning metadata and its influence on content embeddings

on Apr 9, 2024
Thumbnail of an article about Frontend security: API’s key risks and how to mitigate them

Frontend security: API’s key risks and how to mitigate them

on Apr 3, 2024
Thumbnail of an article about IIFE: a (wrongfully?) forgotten JavaScript pattern

IIFE: a (wrongfully?) forgotten JavaScript pattern

on Mar 28, 2024

Get your project estimate

For businesses that need support in their software or network engineering projects, please fill in the form and we’ll get back to you within one business day.

For businesses that need support in their software or network engineering projects, please fill in the form and we’ll get back to you within one business day.

We guarantee 100% privacy.

Trusted by leaders:

Cisco Systems
Palo Alto Services
Equinix
Jupiter Networks
Nutanix