Hardening Kubernetes and What That Entails With Entando
Web Application security is hard. Doing security right in Kubernetes is even more difficult. In order to cover everything listed in the Kubernetes Threat Matrix, you have to follow best practices across the board. Shift security left and use opinionated platforms like Entando.…
Intro DevOps Engineers have moved from on-premise, monolithic applications to large-scale application systems in the…
Process CSVs from Amazon S3 using Apache Flink, JHipster, and Kubernetes
Apache Flink is one of the latest distributed Big Data frameworks with a goal of…
How Kubernetes Add to Your Business
Monolithic applications have been the industry norm for years, however, we here at Ippon have…
Istio architectures generated by JHipster
JHipster is able to generate Kubernetes deployment descriptors for the applications it generates. It recently…