PostgreSQL vs. MySQL: Key Differences and Similarities
In this blog, our expert discusses the differences and similarities between PostgreSQL vs. MySQL, and when teams should consider one open source database over the other.
Databases, Open Source
Blog
Exploring the Rocky Linux Release Candidate
In this blog, our Enterprise Linux expert looks at the inaugural Rocky Linux release candidate, and discusses what users can expect from the upcoming GA release.
Operating Systems, Open Source
Blog
The Problem With VM to Container Lift and Shift
In this blog, our expert discusses why a lift and shift from a VM-based architecture to a Container-based architecture can be problematic.
Containers, Virtualization
Blog
The Open Source Behind Blockchain
In this article, our expert discusses the relevance of blockchain to digital transformation, and highlights some of the open source technologies used in building blockchain.
Open Source, Development
Blog
Grafana License Change: What it Means for Users
In this blog, our expert discusses the recent Grafana license change and what it means for users.
Open Source
Blog
Google vs. Oracle Supreme Court Ruling: Overview and Potential Impact
In this blog, our experts discuss the recent decision from the Supreme Court regarding Google vs. Oracle, and the potential impact it will have on companies and developers.
Open Source, Operating Systems
Blog
Is CAP Theorem Still Relevant?
Learn about CAP theorem, including applied examples and its relevance to modern database and data system design.
Databases, Open Source
Blog
Rancher vs. OpenShift: Platform and Feature Comparison
In this blog, we compare Rancher vs. OpenShift, including an in-depth look at available software, features, and when to use each platform.
Containers, Open Source
Blog
What Is Rancher?
In this blog, we give an overview of Rancher Labs, including features, available software, the operating system, and when companies should consider using the Rancher platform.
CVE-2020-8554 is a Kubernetes vulnerability that, when exploited, allows "man in the middle" attacks to be carried out against pods and nodes in a cluster.
Security, Containers
Blog
Planning a Service Mesh: Key Focus Areas
In this blog, we discuss some of the key focus areas used in planning a service mesh transformation, and the milestones used to track overall progress.
Development, Open Source
Blog
OpenShift vs. Kubernetes: Feature Comparison and Use Cases
In this blog, our open source expert compares OpenShift vs. Kubernetes, with details on the OpenShift platform and its benefits.