Skip to main content

Blog

Blog

PostgreSQL vs. MySQL: Key Differences and Similarities

In this blog, our expert discusses the differences and similarities between PostgreSQL vs. MySQL, and when teams should consider one open source database over the other.
Databases, Open Source
Blog

Exploring the Rocky Linux Release Candidate

In this blog, our Enterprise Linux expert looks at the inaugural Rocky Linux release candidate, and discusses what users can expect from the upcoming GA release.
Operating Systems, Open Source
Blog

The Problem With VM to Container Lift and Shift

In this blog, our expert discusses why a lift and shift from a VM-based architecture to a Container-based architecture can be problematic.
Containers, Virtualization
Blog

The Open Source Behind Blockchain

In this article, our expert discusses the relevance of blockchain to digital transformation, and highlights some of the open source technologies used in building blockchain.
Open Source, Development
Blog

Grafana License Change: What it Means for Users

In this blog, our expert discusses the recent Grafana license change and what it means for users.
Open Source
Blog

Google vs. Oracle Supreme Court Ruling: Overview and Potential Impact

In this blog, our experts discuss the recent decision from the Supreme Court regarding Google vs. Oracle, and the potential impact it will have on companies and developers.
Open Source, Operating Systems
Blog

Is CAP Theorem Still Relevant?

Learn about CAP theorem, including applied examples and its relevance to modern database and data system design.
Databases, Open Source
Blog

Rancher vs. OpenShift: Platform and Feature Comparison

In this blog, we compare Rancher vs. OpenShift, including an in-depth look at available software, features, and when to use each platform.
Containers, Open Source
Blog

What Is Rancher?

In this blog, we give an overview of Rancher Labs, including features, available software, the operating system, and when companies should consider using the Rancher platform.
Containers, Open Source
Blog

Kubernetes Man-in-the-Middle Vulnerability: CVE-2020-8554

CVE-2020-8554 is a Kubernetes vulnerability that, when exploited, allows "man in the middle" attacks to be carried out against pods and nodes in a cluster.
Security, Containers
Blog

Planning a Service Mesh: Key Focus Areas

In this blog, we discuss some of the key focus areas used in planning a service mesh transformation, and the milestones used to track overall progress.
Development, Open Source
Blog

OpenShift vs. Kubernetes: Feature Comparison and Use Cases

In this blog, our open source expert compares OpenShift vs. Kubernetes, with details on the OpenShift platform and its benefits.
Containers, Open Source