November digest

1 minute(s) read

Designing Raspberry Pi 400

The author exposes his 4 years journey designing and making the new Raspberry Pi 400.

Designing Raspberry Pi 400

The Architect’s Path

Gregor Hohpe explores in an articles series an architectural model for a learning path for architects.

The Architect’s Path

FBI hires 140 robots to retrieve sensitive information

Companies around the world are increasing their use of robots. FBI is no exception to this rule. In this article, the author explains how FBI use robots provided by Autostore to retrieve sensitive information.

FBI hires 140 robots to retrieve sensitive information

CNCF End User Technology Radar: Database Storage

The CNCF has just published its database storage technology radar. Beyond the presentation of the radar, the author exposes some trends about technology adoption.

CNCF End User Technology Radar: Database Storage

CNCF Cloud Native Security Whitepaper

The CNCF Security Special Interest Group (SIG) has just released a new Cloud Native Security Whitepaper to help educate the community about best practices for securing cloud native deployments. The whitepaper intends to provide organizations and their technical leadership with a clear understanding of cloud native security and its incorporation in lifecycle processes.

CNCF Cloud Native Security Whitepaper

Docker for Java developers: 5 things you need to know not to fail your security

Always a good reminder about security: be mindful when using Docker. When creating an image for a Java application, some tips to avoid security holes.

Docker for Java developers

The challenges of Reactive Programming

Reactive Programming may sound appealing to develop modern “state of the art” cloud-native applications. The promise is to deliver more efficient software using less threads and system resources. But this perspective is not without challenges! In this article, Clément Escoffier from Red Hat details the bad and best practices using Mutiny, a new reactive programming library.

Mutinity-Flow control and Back pressure


Written by

Blog team

Multiple contributors of the blog