Avatar photo
By: nsuryakumar@suse.com

September 15, 2025 3:24 pm

42 views

Digital Sovereignty and Embedded solutions : Cutting Through the FUD in Europe

Imagine a self-driving car suddenly unable to receive critical security updates due to a geopolitical dispute. Or a factory floor grinding to a halt because a vendor’s software supply chain was compromised. Or a retail store crashing during peak shopping hours because its point-of-sale terminals and smart shelves depend on firmware that can’t […]

Read More


Avatar photo
By: rob.culp@suse.com

September 15, 2025 2:00 pm

40 views

Combining Confidential Computing with Hardware Acceleration to enhance end-to-end value/benefit

SUSE's latest Technical Reference Document, "Confidential Computing with SUSE Linux Enterprise Base Container Images Using the IBM Hyper Protect Platform," guides organizations as they enhance data security with hardware-based cryptographic capabilities. While confidential computing protects data in use, the guide's additions detail how to leverage powerful hardware to further secure and accelerate sensitive […]

Read More


Avatar photo
By: Tobias Kutning

September 15, 2025 1:00 pm

38 views

Drive Superior SAP High Availability on Azure with SUSE and Microsoft

Co-authored by Sanoop Nampoothiri, Principal Software Architect at Microsoft   Running mission-critical SAP workloads requires robust high availability (HA) solutions. For years, SUSE and Microsoft have partnered to deliver secure, reliable and cost-effective SAP deployments on Azure. This collaboration focuses on innovation, joint quality assurance and continuous improvement, ensuring your SAP systems remain resilient and […]

Read More


Avatar photo
By: Ivan Tarin

September 15, 2025 3:39 am

89 views

Kubernetes Cost Optimization: Top Factors, Challenges and Strategies

Kubernetes cost optimization is growing more urgent and more complex. Elastic scaling, spot-instance volatility and usage-based pricing frequently lead to unpredictable cloud costs, even in mature environments. When workloads span clusters and clouds, platform teams often lack the visibility to pinpoint the specific changes that lead to increased spend. Engineering leaders must regularly make difficult […]

Read More


Avatar photo
By: Caroline Thomas

September 12, 2025 9:16 pm

285 views

Cutting Edge: Delivering Consistency, Performance, Reliability and Security

The edge computing world is going through a dramatic transformation. According to IDC's Worldwide Edge Spending Guide, global spending on edge computing reached $228 billion in 2024, marking a 14% increase from 2023, with forecasts predicting continued growth to nearly $378 billion by 2028. This shift represents a fundamental change in how organizations approach computing […]

Read More


Avatar photo
By: Ivan Tarin

September 12, 2025 9:11 pm

270 views

5 Future Trends in Container Management Software: What to Expect

Across the enterprise landscape, containerized workloads have evolved beyond deployment patterns. Increasingly, they underpin the way that organizations build, secure and scale their next generation services.  Container management software can elevate the impact of AI and edge computing, while also supporting stricter compliance mandates. As a result, enterprises no longer consider open architectures, portable […]

Read More


Avatar photo
By: Timo Jokiaho

September 12, 2025 8:56 pm

282 views

From Core to Edge: Telco Modernization Today

Telecommunications leaders are navigating one of the most challenging periods in the industry’s history. Investments in 5G infrastructure now measure in the billions, while rising operating expenses and market competition leave little room for missteps.  This means that modernization has become essential to operational excellence and long-term relevance. The strongest technology transformations address […]

Read More


Avatar photo
By: Adarsh Kumar

September 9, 2025 4:19 am

398 views

Why AI Security Starts at the OS Level: SUSE’s Role in Protecting AI Models and Data

Artificial intelligence is reshaping how enterprises deliver value, from accelerating customer service with generative models to optimizing global supply chains. But as organizations race ahead, one fact is often overlooked: AI is only as secure as the foundation it runs on. While enterprises invest heavily in firewalls, Kubernetes security policies, and model guardrails, attackers often […]

Read More


Avatar photo
By: Garrick Lee

September 8, 2025 9:49 pm

403 views

Driving Innovation with SUSE Rancher Prime and Plainsight: AI-Ready, Anywhere

Posted on behalf of: Kit Merker | CEO | Plainsight  Steve Hale| Sr. Director, ISV Partnerships | SUSE In today’s enterprise landscape, success depends on being able to harness innovation quickly and reliably. Organizations are under pressure to scale applications, secure environments, and adapt to fast-changing business demands. This is especially true for […]

Read More