Agustin Romano

Leveraging AWS for #Backup and #DisasterRecovery — 8 Best DR Practices 2

Leveraging AWS for Backup and Disaster Recovery — 8 Best DR Practices

In today’s market, all companies are technology companies. Yet, Invenio IT reports that every 1 in 5 organizations does not have a disaster recovery plan. A company without a disaster recovery is prone to the type of IT disaster (from server corruptions, data center failures and cyberattacks) that can disrupt the entire functioning of day-to-day …

Leveraging AWS for Backup and Disaster Recovery — 8 Best DR Practices Read More »

#AWSCloudMigration - How To Determine First-Mover Workloads

AWS Cloud Migration: How To Determine First-Mover Workloads

Cloud Migration takes a lot of planning and assessments to shift workloads safely without interrupting your business. The cloud infrastructure is limitless with a range of benefits. Still, it also poses some complications along the process, especially for those companies who want to move their critical workload without disturbing their running operations.  So how exactly …

AWS Cloud Migration: How To Determine First-Mover Workloads Read More »

Improving Kubernetes Security with #OpenPolicyAgent (OPA)

Improving Kubernetes Security with Open Policy Agent (OPA)

Many multinational organizations now run their applications on microservice architecture inside their cloud environments, and (many) administrators are responsible for defining multiple policies on those environments. These giant IT organizations have extensive infrastructure systems and their systems have their own policy modules or their own built-in authorization systems. This is an excellent solution to a …

Improving Kubernetes Security with Open Policy Agent (OPA) Read More »

Understanding Kubernetes Operators

Automation is one of the fundamental components that makes Kubernetes so robust as a containerization engine. Even complex cloud infrastructure creation can be automated in order to simplify the process of managing cloud deployments. Despite the capability of leveraging so many resources and components to support an application, your cloud environment can still be fairly …

Understanding Kubernetes Operators Read More »

Infrastructure as Code vs. Infrastructure as Software

Infrastructure as Code has been the hottest trend in cloud-native application development in recent years. By transforming infrastructure management into simple coded runtimes and routines, Infrastructure as Code or IaC allows developers to be more involved in the deployment part of their CI/CD pipelines. Even the most complex cloud infrastructure can be created with several …

Infrastructure as Code vs. Infrastructure as Software Read More »

How to Create Your Own Kubernetes #CustomResources

How to Create Your Own Kubernetes Custom Resources

As a platform for managing containerized services and workloads, Kubernetes is incredibly modular. Modularity is more than just a theme; even controllers and resources that are native to Kubernetes are now being built as custom resources and controllers, all for the sake of expanding the platform’s modularity to the next level. Of course, Kubernetes custom …

How to Create Your Own Kubernetes Custom Resources Read More »

#GitOps for Kubernetes

GitOps for Kubernetes

Cloud-native applications are dominating the market with their improved performance and high efficiency. While there are more resources to support cloud-native applications running as microservices, managing complex cloud architecture is still a challenge. The more microservices you run, the more tasks you will have to deal with in order to keep the cloud environment healthy …

GitOps for Kubernetes Read More »

Implementing #AquaSecurity to Secure Kubernetes

Implementing Aqua Security to Secure Kubernetes

Despite the maturity of the platform, security is still a big challenge for Kubernetes users. While Kubernetes offers maximum flexibility, modularity, and ease of use in other areas, the complex nature of Kubernetes-based environments means securing the cloud environment completely is a complex task to complete. There are a lot of tools and services that …

Implementing Aqua Security to Secure Kubernetes Read More »


Spotlight on Aqua Security

Security has always been an important aspect of cloud deployment. While cloud infrastructure services like AWS are now equipped with built-in security tools, there is still a big need for container-level security and a more holistic approach to cloud security in general. Aqua Security is the leading provider for container-based applications, particularly applications designed to …

Spotlight on Aqua Security Read More »

Securing Your #KubernetesPipeline

Securing Your Kubernetes Pipeline

Several elements are crucial to an effective and efficient CI/CD workflow. A cloud-native app designed to take advantage of containers and other cloud-native features is certainly one of those elements. A capable cloud infrastructure with containers configured for maximum performance is another. To complete the set, you need cloud-native tools to manage the CI/CD workflow …

Securing Your Kubernetes Pipeline Read More »

What Is #NoOps

What Is NoOps?

Automation has been driving the entire IT industry forward this past couple of years. By automating certain tasks, development teams can increase their capacity without…