Filter & Sort
  1. The 3 Es of Diskless Kafka BYOC

    Explore three ways to buy Kafka in the cloud—Multi-Tenant SaaS, Single-Tenant SaaS, and Bring Your Own Cloud (BYOC)—and discover why Diskless BYOC offers significant economic, enforcement, and enterprise discount advantages for organizations operating Kafka at scale, challenging traditional fully-managed solutions.

  2. PostgreSQL® extensions you need to know in 2025

    Uncover the pivotal role of PostgreSQL's extensions ecosystem, its historical context, and why it remains indispensable for modern data needs, including AI and analytics. Dive into key extensions like TimescaleDB, PostGIS, and pgvector, and learn how a managed service, like Aiven, mitigates risks and enhances reliability.

  3. Diskless Kafka is the Tide, and it’s Rising

    Discover KIP-1150 Diskless Topics now live in Aiven Kafka BYOC, enabling Apache Kafka on AWS, Google Cloud, and Azure to write directly to object storage. Learn how this innovation slashes costs by up to 80%, eliminates operational toil, and maintains 100% Apache Kafka compatibility, ensuring zero vendor lock-in and a single logical cluster for all streaming workloads.

  4. Rails debug mode enabled

    Uncover the critical security risks of running Ruby on Rails in development mode on a live server, from exposing internal workings and sensitive information to increasing the risk of remote code execution and DoS attacks. Learn practical steps to safeguard your application and prevent these vulnerabilities.

  5. How to store and secure sensitive data in web applications

    Given the surge in web application data breaches, learn how to effectively store and secure sensitive data in your web applications. This article explores critical data types, client-side and server-side storage mechanisms, common OWASP Top 10 vulnerabilities, and essential protective measures like robust authentication, access control, and encryption strategies.

  6. Master API security: Securing your entire API ecosystem with Beagle Security’s API discovery

    Discover how unchecked API sprawl creates critical security blind spots for fast-growing fintech startups, leading to data breaches and operational inefficiencies. Learn how Beagle Security's API discovery feature automatically uncovers and tests all APIs within Kubernetes or Istio environments, ensuring complete visibility and proactive vulnerability management.

  7. Overriding variables in Terraform

    Sometimes, overriding variables in Terraform is needed for testing or using code outside its intended usage patterns. This article shows you how.

  8. 6 ways available to address interoperability challenges across software systems

    Discover the six essential tools available to tackle interoperability challenges across industries in our latest blog post. 

  9. Expressions in Terraform

    Expressions are one of the most powerful features of any programming language and Terraform is no expection. Version 0.12 added more powerful features.

  10. Securing Kubernetes Networking with TLS Encryption: A Comprehensive Guide

    Secure Kubernetes networking with TLS encryption. Importance of networking security and a step-by-step guide to implement TLS encryption for your cluster.

  11. Practical advise for DevSecOps, its just DevOps with strings attached

    With the rise in interest in security, the DevOps world is looking to integrate security into their processes. Here's how you DevSecOps.

  12. 5 Different types of cloud-specific and open-source ingress controllers

    Explore the top 5 open-source ingress controllers for Kubernetes. From Istio and HAProxy to Traefik and NGINX, choose the right tool to automate traffic management and boost security.

Items 1 to 12 of 171 total

Show per page