OVHcloud Secret Manager meets External Secrets Operator: the new ESO OVHcloud provider brings Kubernetes secrets under control

Kubernetes has many talents: scheduling, self-healing, service discovery, turning YAML into existential dread. But it has never been particularly great at keeping secrets secret. Sure, it has Secret objects — but “base64-encoded” is not a synonym for “secure,” and anyone who has ever accidentally committed an imagePullSecret to Git can confirm that entropy is not…

Kubernetes at the Edge with KubeEdge: What Giant Swarm’s Talk Gets Right (and What You Need to Watch in Production)

Edge computing has an image problem. Mention it at a party (or, more realistically, in a sprint planning meeting) and you’ll see eyes glaze over: “Oh, you mean smaller cloud.” But the edge isn’t smaller cloud. It’s cloud with worse Wi-Fi, tighter power budgets, fewer hands-on operators, and an irritating tendency to be bolted to…

Kubernetes v1.36 Sneak Peek: The Security-Cleaning, Token-Signing, GPU-Splitting Release (Plus What Might Break on Upgrade)

Kubernetes upgrades have a reputation: they’re either delightfully boring (“it just worked”) or they’re the reason your on-call rotation suddenly becomes a cardio program. Kubernetes v1.36 looks like it wants to live in the first category—quietly improving security and platform maturity—while still slipping a few “please read this before upgrading” notes under your keyboard. This…

Kubernetes v1.36 Sneak Peek: The Upgrade That Quietly Saves You From Yourself (externalIPs deprecation, gitRepo removal, DRA partitioning, and more)

Kubernetes releases are like seasonal flu shots: you can skip them for a while, but eventually you’ll be forced to deal with consequences that are way less fun than reading release notes on a Friday night. On March 30, 2026, the Kubernetes project published “Kubernetes v1.36 Sneak Peek”, a forward-looking post outlining deprecations, removals, and…

Appknox KnoxIQ: AI-Prioritized Mobile App Vulnerability Detection Meets AI-Powered Remediation

Mobile app security has always had an awkward problem: the most important bugs are often not the ones with the scariest-sounding scores. And the ones with the “meh” scores can still ruin your week if they’re easy to exploit in your specific app, on your specific runtime path, in front of your specific users—preferably while…

Azure IaaS Resiliency at Scale: Keeping Critical Apps Running When the Cloud Gets Grumpy

Cloud outages are a bit like printer jams: nobody plans for them, everyone swears they “rarely happen,” and somehow they always show up at the worst possible time—like during a product launch, a payroll run, or the quarterly “we promise the board we’re stable now” presentation. That is why I’m glad Microsoft is leaning hard…

Kubernetes at the Edge with KubeEdge: Bringing Cloud‑Native Orchestration to IoT (and to the places Wi‑Fi fears to go)

Edge computing is what happens when reality collides with your architecture diagram. In the cloud, your nodes are pampered: stable power, stable networking, stable kernels, and a team that panics when latency goes above “annoying.” At the edge—factories, retail stores, vehicles, ships, wind farms, and other places where Ethernet is more rumor than resource—your nodes…

Intel’s All‑In Bet on Advanced Chip Packaging: Why EMIB, Foveros, and “Systems Foundry” Could Decide the Next AI Hardware Era

Intel is making a very public—and very expensive—point lately: the future of chips is not just about smaller transistors. It’s about how you stitch multiple pieces of silicon together so they behave like one monster processor without turning your data center into a space heater with networking cables. That’s the core theme behind the original…

The One Missing Data Point in the AI Jobs Panic: Price Elasticity (and Why O*NET Isn’t Enough)

On April 6, 2026, MIT Technology Review ran a deceptively simple headline: “The one piece of data that could actually shed light on your job and AI.” The piece (by James O’Donnell) argues that we’re obsessing over the wrong numbers when we ask whether AI will “take jobs.” The data we don’t have—systematically, across the…

Defending Your Software Supply Chain in 2026: Docker’s CISO on Why “Implicit Trust” Is the New Zero-Day

Engineering teams have always shipped software on a schedule best described as “optimistic.” But in 2026, there’s a new constraint that refuses to be sprint-planned away: your software supply chain is now a primary attack surface, and it’s getting hammered with the enthusiasm of a botnet that just discovered caffeine. That’s the core thesis of…