hero-FG-blog

Kasten K10 Blog

All Things Kubernetes and Data Management

The Cost of Zero RPO on Kubernetes

The Cost of Zero RPO on Kubernetes

Near-zero Recovery Point Objective (RPO) and short Recovery Time Objective (RTO) are often requirements for critical service. It’s important to understand why. Read more →
Cloud Native, Kubernetes & Ransomware: What’s Your Last Line of Defense?

Cloud Native, Kubernetes & Ransomware: What’s Your Last Line of Defense?

Given the unique characteristics of Kubernetes environments and the increasing frequency of ransomware attacks, what do organizations need to do to mitigate the threat of ransomware? Read more →
Kubernetes for Container Orchestration: An Introduction

Kubernetes for Container Orchestration: An Introduction

Kubernetes is brand new for many developers. That’s why in a recent webinar, I provided an introduction to Kubernetes and the building blocks within it that developers use to create cloud-native applications in Kubernetes. Read more →
My One Year at Kasten by Veeam

My One Year at Kasten by Veeam

Earlier this week, our CEO Bill Largent reminded me with a kind note and certificate that I'm celebrating one year at Kasten by Veeam. What a ride it has been! Read more →
Welcome to Cloud Native - We're Here to Help

Welcome to Cloud Native - We're Here to Help

I had a wonderful opportunity to present a keynote at this past week’s KubeCon + CloudNativeCon North America 2021 in Los Angeles. I used that time to discuss some of the challenges new Cloud Native users face and what we, as Kasten by Veeam, are doing to help. Read more →
Extending Kubernetes Application Backup and Mobility to the Edge with Kasten K10 V4.5

Extending Kubernetes Application Backup and Mobility to the Edge with Kasten K10 V4.5

Kubernetes is without a doubt the de facto platform for running both stateless and stateful applications in the cloud. Enterprises are becoming increasingly reliant on its ecosystem for business operations — cloud, development and IT operations teams must keep up with the rate of innovation happening on the platform. Read more →
Announcing the Kasten Kubernetes Learning Series

Announcing the Kasten Kubernetes Learning Series

Kubernetes adoption has grown rapidly. Some industry reports note that 90% of organizations surveyed are using Kubernetes in some fashion. However, a lack of Kubernetes training  continues to be one of the major challenges to broad adoption. To meet the demand for effective training at all levels, Kasten is offering extensive training opportunities for the most in-demand Kubernetes skills, based on practical, real-world use cases and experience. Read more →
Welcome to Kubernetes Korner

Welcome to Kubernetes Korner

We've created an open community forum where we can discuss all things Kubernetes, Data Management, Kasten K10 by Veeam, and all DevOps topics in one place where anyone can contribute, learn, or share. You will see why we decided on this route vs the what seems to be the defacto now to create a discord or slack channel at the end of the post. Read more →
Move Fast and Test in Kubernetes without Breaking Things

Move Fast and Test in Kubernetes without Breaking Things

Continuous integration and continuous delivery (CI/CD) in application development is an approach that enables developers to make code changes rapidly and reliably, accelerating development lifecycles and getting new applications to market faster. But the underlying assumption is that developers can test on data at different stages of the pipeline.  Herein lies the rub: Historically, fear and risk have prevented development teams from integrating production databases into the development process. Why are they afraid? There are three valid reasons: Read more →
Goodbye to Ransomware: 2-Step Protection for Kubernetes Applications

Goodbye to Ransomware: 2-Step Protection for Kubernetes Applications

While ransomware attacks have had a huge impact on traditional applications for years, Kubernetes environments are also at risk. As the number and magnitude of Kubernetes applications increase, so do malicious attacks on those applications.  Read more →