An API, or application programming interface, is an interface that allows applications to communicate with one another, with other programs, and with end-users.
Read MoreApplication modernization is the process of taking legacy applications on older platforms and updating their platform and architecture. It is frequently...
Read MoreApplication Performance Monitoring is a set of tools and practices to introspect and diagnose large complex application performance issues with the...
Read MoreAuthentication is the verification of identity. Today's applications control access to sensitive data that should only be exposed to the appropriate consumer.
Read MoreA canary release is a strategy for incrementally releasing new versions of an application or service to a subset of users to mitigate the risk of failure...
Read MoreThe circuit breaker pattern is a resilience pattern to prevent cascade failure. In a distributed system, the failure of one component can quickly lead to...
Read MoreAdopting Cloud-Native: Leverage containerization, microservices, and dynamic orchestration to build resilient and elastic applications for rapid delivery.
Read MoreA container is a self-contained software artifact that includes an application & all the dependencies necessary for the application to run. A container enables...
Read MoreExplore what a Container Registry is, its pivotal role in cloud-native technologies & its benefits in enhancing security and scalability in software deployments
Read MoreThe data plane is a layer of service proxies that manage application-level network traffic. Data plane typically operate on Layer 7 (application) traffic...
Read MoreDevOps is a philosophy in which development & operations teams work together in a rapid cycle of building, testing, & deploying software, in a microservices...
Read MoreDistributed tracing is a technique for troubleshooting and profiling distributed microservices applications. In a microservices architecture, a single request...
Read MoreDocker is a suite of tools that allows the packaging, distribution, and deployment of software applications as containers. In the cloud-native ecosystem, Docker
Read MoreEnvoy Proxy is a modern, high performance, small footprint edge and service proxy. Envoy is most comparable to software load balancers such as NGINX and...
Read MoreDiscover how full cycle software development boosts velocity and quality by giving teams end-to-end ownership—from coding to production support.
Read MoreGitOps is an operating model for cloud-native applications built on the principle that the source of truth for an entire application from its deployment...
Read MoregRPC is a high performance, polyglot RPC protocol & framework built on HTTP/2 and Protocol Buffers. Designed for applications that are heavily dependent on RPC...
Read MoreGzip compression is a technique for minimizing bandwidth in communication through compression. Gzip compression can improve network performance at the...
Read MoreHeader Propagation, also referred to as Context Propagation, is the technique by which context is transferred across services and remote processes through...
Read MoreHigh availability is a principle of software or an application maintaining functionality or “staying up” despite interruptions. Commonly abbreviated as...
Read MoreHTTP is an application protocol for data exchange that relies on a request/response model. Due to its nature as the foundational protocol for the modern...
Read MoreIdentity and Access Management is about defining and enforcing policies to ensure the right individuals, through their digital identity, have the proper roles...
Read MoreAn Identity Provider is a trusted system or service that manages and verifies identity information. A typical identity provider, or IDP, stores information...
Read MoreAn ingress controller is a Kubernetes application that can process routing rules according to the Kubernetes ingress specification. An ingress controller...
Read MoreIs a utility in the user-space where a root user can configure a set of table rules for the Linux kernel firewall.
Read MoreIstio is an open source service mesh built on Envoy Proxy. Originally created by IBM and Google, Istio provides a broad set of service mesh functionality...
Read MoreJSON Web Tokens, or JWTs, are a standard way for securely representing claims. A JWT consists of a digitally signed payload. The most common use case for JWT...
Read MoreKube-proxy is the routing layer used by Kubernetes to route traffic between nodes in a cluster. Built on iptables, kube-proxy operates at Layer 4...
Read MoreKubectl is the command line interface that developers & operators use to interact with the Kubernetes API. Kubectl connects to the kubernetes API server running
Read MoreKubernetes is an open-source container management system widely used for running cloud applications. Originally developed by Google, Kubernetes is now...
Read MoreA Kubernetes API Gateway is an intermediary layer within a Kubernetes environment that manages communication between clients and microservices. It offer...
Read MoreLayer 7 is the application-level communication layer in the OSI network model. In networking, communication between services happens at multiple layers...
Read MoreA load balancer is a traffic management implementation that optimizes resource use by distributing network traffic across different, redundant servers...
Read MoreA microservices is a software module that is developed, deployed, & released independently. Multiple microservices, working together, comprise of an...
Read MoreA monolith is a single, standalone application that is deployed as a single unit. Monoliths were a dominant application architecture in the 2010s, as web...
Read MoreMulti-cluster is an architecture strategy for deploying a cloud native application on or across multiple Kubernetes clusters. Multi-cluster architectures...
Read MoreA Kubernetes node is a physical or virtual machine that runs containerized workloads. A Kubernetes cluster consists of multiple nodes that are joined together
Read MoreA NodePort is a way to enable Kubernetes services to receive traffic from outside the cluster. In a NodePort, the Kubernetes API server allocates a specific...
Read MoreOAuth is an open standard and protocol for authentication on the Internet.The OAuth protocol enables Single Sign-On use cases, where a user can authenticate...
Read MoreObservability is the ability for a system to provide data into the behavior of systems, along with the context with which to analyze that data. Highly...
Read MoreOpenID Connect (OIDC) is an authentication layer that enables web applications to authenticate users without storing and managing credentials. Built on the...
Read MorePods are the basic compute deployment unit in Kubernetes. Pods consist of one or more containers. All containers on the pod are managed together and share...
Read MoreProgressive delivery is a software development practice that emphasizes incrementally releasing features to end users. By incrementally rolling out features...
Read MoreA proxy is an intermediary between a source (typically, a client) and a destination (typically, a server-based application). When a proxy is deployed, all...
Read MoreRate limiting is a technique used to control the amount of incoming and outgoing traffic to or from a network, or the amount of data being queried...
Read MoreResilience is the ability for an application to maintain operational status and acceptable service to users despite faults, errors, or threats.
Read MoreSelf-service is an operating model for infrastructure software focused on empowering application developers to safely make infrastructure changes.
Read MoreServer Name Indication, or SNI, is an extension to the TLS protocol that allows a single server to securely host multiple domains. With SNI, a client can...
Read MoreServerless is a computing model where code is directly deployed on compute resources in a way that is abstracted from the developer. Also know as Function...
Read MoreA Service Catalog is a centralized portal for tracking microservices. With access to a Service Catalog, developers get an integrated, developer-friendly view...
Read MoreService discovery enables apps and microservices to locate each other. Learn about implementations, central servers, and cloud-native architecture benefits.
Read MoreTraffic shadowing is a routing strategy whereby incoming requests are duplicated and sent to two different destinations. Also called mirroring, traffic...
Read MoreTransport Layer Security, or TLS, is a network protocol that secures network communication. Websites use HTTP over TLS ("HTTPS") to secure communication...
Read MoreVersion 0 is a development technique that involves shipping an end-to-end development and deployment workflow as the first milestone. Also known as a "dancing..
Read MoreA virtual machine is a software computer that simulates a physical machine. Virtual machines are designed to be indistinguishable from a physical machine...
Read MoreYAML is a common, human readable language for configuration. Defined as a recursive acronym "YAML Ain’t Markup Language," YAML is the common configuration...
Read More