top of page
Search
Deep Dive


Securing AI on Untrusted Infrastructure With Kata Containers & Confidential Computing
Artificial intelligence workloads are becoming some of the most valuable assets an organization runs. Models capture years of research and tuning. Datasets encode customer behavior, health information, or financial risk profiles. At the same time, more of that compute is running on infrastructure you do not fully control, whether that is a public cloud, a partner data center, or a cluster of GPUs at the edge sitting in a closet in a retail store.

Steve Younger
Dec 1, 202514 min read


Kubernetes Pod Requests and Limits: From Fundamentals to FinOps Excellence
Discover how setting the right CPU and memory requests and limits in Kubernetes keeps your applications running smoothly and your cloud costs in check. From basic QoS classes to advanced FinOps strategies and hidden CPU throttling pitfalls, this guide equips you with practical insights to optimize performance and budget.

Steve Younger
Apr 27, 202527 min read


Navigating Tech Planning Amid Tariffs, Chip Shortages, and the Container Revolution
As global tariffs and supply chain disruptions derail hardware procurement, containerization, hybrid cloud, and edge computing empower CIOs to build agile, resilient infrastructure—ensuring performance, flexibility, and cost control in uncertain times.

Steve Younger
Apr 22, 202512 min read
bottom of page
