top of page
Search


Securing AI on Untrusted Infrastructure With Kata Containers & Confidential Computing
Artificial intelligence workloads are becoming some of the most valuable assets an organization runs. Models capture years of research and tuning. Datasets encode customer behavior, health information, or financial risk profiles. At the same time, more of that compute is running on infrastructure you do not fully control, whether that is a public cloud, a partner data center, or a cluster of GPUs at the edge sitting in a closet in a retail store.

Steve Younger
Dec 114 min read


Kubernetes Pod Requests and Limits: From Fundamentals to FinOps Excellence
Discover how setting the right CPU and memory requests and limits in Kubernetes keeps your applications running smoothly and your cloud costs in check. From basic QoS classes to advanced FinOps strategies and hidden CPU throttling pitfalls, this guide equips you with practical insights to optimize performance and budget.

Steve Younger
Apr 2727 min read


How Kubernetes Is Revolutionizing Container Signal Handling
Discover how signal handling can make or break the graceful shutdown process for your containerized applications—and why it matters more than ever in Kubernetes environments. This in-depth guide explores the key differences between running applications on bare-metal or virtual machines versus containers, highlighting the challenges that can arise when traditional VM assumptions meet containerization realities.

Steve Younger
Apr 1221 min read
bottom of page
