top of page
Search
Deep Dive


Securing AI on Untrusted Infrastructure With Kata Containers & Confidential Computing
Artificial intelligence workloads are becoming some of the most valuable assets an organization runs. Models capture years of research and tuning. Datasets encode customer behavior, health information, or financial risk profiles. At the same time, more of that compute is running on infrastructure you do not fully control, whether that is a public cloud, a partner data center, or a cluster of GPUs at the edge sitting in a closet in a retail store.

Steve Younger
Dec 114 min read


Kubernetes Pod Requests and Limits: From Fundamentals to FinOps Excellence
Discover how setting the right CPU and memory requests and limits in Kubernetes keeps your applications running smoothly and your cloud costs in check. From basic QoS classes to advanced FinOps strategies and hidden CPU throttling pitfalls, this guide equips you with practical insights to optimize performance and budget.

Steve Younger
Apr 2727 min read


Navigating Tech Planning Amid Tariffs, Chip Shortages, and the Container Revolution
As global tariffs and supply chain disruptions derail hardware procurement, containerization, hybrid cloud, and edge computing empower CIOs to build agile, resilient infrastructure—ensuring performance, flexibility, and cost control in uncertain times.

Steve Younger
Apr 2212 min read
bottom of page
