Avatar photo
By: Gopala Krishnan A

March 9, 2026 5:10 pm

128 views

Key Considerations for Implementing Modern Virtualization

  The enterprise virtualization market has reached a definitive inflection point. Following Broadcom’s acquisition of VMware, organizations are facing a new reality characterized by rising costs, licensing uncertainty, and a shrinking ecosystem of legacy support. Industry data suggests that 74% of enterprises are actively taking steps to reduce their VMware footprint, looking for […]

Read More


Avatar photo
By: Ivan Tarin

February 24, 2026 11:12 pm

176 views

Unify Visibility and Security Across Your Hybrid Cloud Wherever It Lives

Hybrid environments grow fast, as does the list of tools they require. When teams adopt separate solutions for cluster management, security and observability, each one adds a dashboard, a data model and potential blind spots. The result is sprawl that obscures rather than clarifies. Fortunately, there are practical ways to regain control without sacrificing the […]

Read More


Avatar photo
By: Peter Smails

February 18, 2026 6:00 am

910 views

SUSE Virtualization certified by Dell Technologies to modernize without compromise

SUSE Virtualization is now certified by Dell Technologies for its Dell PowerStore, PowerMax and PowerFlex platforms. It provides a clear exit strategy for enterprises that want to phase out proprietary vendors and traditional hypervisors. It signals that an open, Kubernetes‑native virtualization platform is a fully supported path today. Escaping proprietary lock-in and accelerating modernization are […]

Read More


Avatar photo
By: Ted Jones

February 7, 2026 5:46 pm

258 views

From “Connection Refused” to “Active”: My Journey Running RKE2 on SLES 15 ARM with an M-Series Mac

Building a Kubernetes home lab on the Apple M4 chip offers incredible performance, but it can be a significant configuration challenge. This week, I successfully set up Rancher Manager on RKE2 using SLES 15 SP4 on VirtualBox 7. The process was a battle against SSL handshakes, disappearing network interfaces, and restrictive Mac security policies. Below […]

Read More


Avatar photo
By: Terry Smith

February 2, 2026 3:17 pm

483 views

Apono and SUSE Rancher Prime: Better Together for Secure Kubernetes Access

SUSE GUEST BLOG ARTICLE AUTHORED BY: Ben Avner is the Head of Ecosystem and Strategic Alliances at Apono, where he leads the company’s global partner strategy and technology alliances. He focuses on building and scaling strategic partnerships that drive product innovation, partner-influenced pipeline, and long-term growth. A former founder and engineer, Ben brings a […]

Read More


Avatar photo
By: Erico Mendonca

December 26, 2025 7:16 pm

410 views

SUSE AI: A new foundation for your private AI implementation (part 7)

Last time… In the last article, we installed SUSE Observability, a powerful tool to get insights for all aspects of our cluster and workloads. Today, we’ll add the metrics module for our LLM and GPU workloads and explore a bit of the WebUI! Adding GenAI Observability metrics To collect metrics related to GenAI (GPU/LLM/Vector […]

Read More


FX Houard
By: François-Xavier "FX" Houard

December 24, 2025 10:06 am

376 views

Stability Meets Innovation: The SUSE Application Collection 2025 Retrospective

In 2025, the market for enterprise‑grade distribution of cloud‑native open-source applications didn’t just get busier; it got louder, more unpredictable, and at times outright chaotic. Popular offerings retreated behind sudden paywalls, while other vendors treated the market like a sandbox for their latest monetization pivots, like “sorcerer’s apprentices” endlessly tweaking their models […]

Read More


Avatar photo
By: Ivan Tarin

December 22, 2025 7:02 pm

568 views

5 Kubernetes Challenges and How to Address Them

Kubernetes has transformed how organizations deploy and manage applications, but implementing it successfully comes with real challenges. From limited expertise to security vulnerabilities, these obstacles can prevent teams from reaping the full benefits of their container orchestration investments. You don't need to navigate these Kubernetes challenges alone. With the right approach and tools, you can […]

Read More


Avatar photo
By: Ivan Tarin

December 22, 2025 6:51 pm

298 views

What Is Vulnerability Scanning? Benefits, Challenges and Essential Tool Features

Vulnerability scanning automates the discovery of known flaws and, therefore, is vital to maintaining a forward-looking security posture. Whether integrated directly into your CI/CD pipeline or delivered as a fully managed service, it allows organizations to identify threats before they reach production, prioritize response and reduce exposure. Thoughtfully selecting the right scanner technology ensures your […]

Read More