Avatar photo
By: Ken Lee

February 27, 2024 10:06 pm

202 views

What is Public Cloud Computing and How Does It Work?

In the ever-evolving technological landscape, cloud computing has emerged as a cornerstone for modern businesses, offering unparalleled flexibility, scalability, and efficiency in managing IT resources. At its core, cloud computing allows organizations to access and utilize computing services—such as servers, storage, databases, networking, software, analytics, and intelligence—over the internet, enabling faster innovation, flexible […]

Read More


Avatar photo
By: Ken Lee

February 27, 2024 8:49 pm

170 views

What is a Cloud Migration Strategy? An In-Depth Analysis

In today’s tech-driven economy, understanding cloud migration strategy is pivotal for businesses aiming to harness the power of digital transformation. Cloud computing, a revolutionary technology, offers computing services—servers, storage, databases, networking, software, analytics, and intelligence—over the internet ("the cloud") to provide faster innovation, flexible resources, and economies of scale. At […]

Read More


Avatar photo
By: Raj Meel

February 14, 2024 10:56 am

898 views

SUSE Releases ATIP 3.0: Enhanced Adaptable Platform for Telecom Operators

We are pleased to announce the newest iteration of our flagship telco cloud platform SUSE Adaptive Telco Infrastructure Platform (ATIP) 3.0 to help customers achieve faster time-to-market and future-proof their networks. “The telco market is undergoing transformation, and our customers are responding to SUSE ATIP as it delivers on the promise of an […]

Read More


Avatar photo
By: Ken Lee

February 13, 2024 11:18 pm

795 views

Cloud Computing vs. Edge Computing

Cloud Computing vs. Edge Computing: What’s the Difference? Introduction to Edge Computing Vs. Cloud Computing In the dynamic world of digital technology, Cloud Computing and Edge Computing have emerged as pivotal paradigms, reshaping how businesses approach data and application management. While they might appear similar at first glance, these two technologies serve different purposes, […]

Read More


Avatar photo
By: Ken Lee

February 7, 2024 5:20 pm

1,603 views

How Does Kubernetes Work?

How Does Kubernetes Work? An In-Depth Overview for Beginners Introduction In today's rapidly evolving digital landscape, understanding Kubernetes has become essential for anyone involved in the world of software development and IT operations. Kubernetes, often abbreviated as K8s, is an open source platform designed to automate deploying, scaling, and operating application containers. Its rise to […]

Read More


Avatar photo
By: Stacey Miller

February 6, 2024 9:30 am

981 views

SUSE and IBM: Bringing the Mainframe to the Masses

Almost 60 years ago, IBM unveiled a new era in computing by introducing the mainframe.  Thirty years later, SUSE was the first company to deliver an Enterprise Linux for the platform.  Many people have asked, “Is the mainframe dead?”  The answer to that is a resounding no.  And to […]

Read More


Avatar photo
By: Glen Kosaka

January 30, 2024 7:21 pm

1,224 views

NeuVector Releases v 5.3.0: Enhancing Network Security and Automation

We are pleased to announce the release and general availability of NeuVector version 5.3.0! This release adds significant functionality to our market-leading container network security protections, as well as support for GitOps security as code automation. It also expands the breadth of platform compatibility with Arm64 and public cloud marketplace support.   […]

Read More


Avatar photo
By: Glen Kosaka

January 19, 2024 8:11 pm

1,408 views

Security Controls for the OWASP Kubernetes Top 10

Using NeuVector to Reduce Risk in Kubernetes Kubernetes has become the de-facto standard for container orchestration platforms and is widely used in business-critical infrastructure in enterprises of all sizes. With this popularity comes an increase in focus for hackers to exploit vulnerabilities and misconfigurations in Kubernetes clusters. The orchestration layer system resources, as well as […]

Read More


Avatar photo
By: Radoslav Kolev

January 18, 2024 10:39 am

1,377 views

How to extract the signer’s certificate and verify the signature of a Linux kernel image

It's been quite a while since the introduction of UEFI and Secure Boot, which ensures that only code bearing a signature by a trusted party will get executed by the firmware. After a brief period of uncertainty this is now well supported by default in many Linux distributions. The Zero trust security model gaining popularity […]

Read More