Get ahead of the curve with the latest insights, trends, and analysis in the tech world.
Which local model should I use for tool calling? When building GenAI and agentic applications, one of the most pressing and persistent questions is: βWhich local model should I use for tool calling?β We kept hearing again and again, from colleagues within Docker and the developer community, ever since we started working on Docker Model...
In todayβs fast-paced technological landscape, the transformative power of AI and automation is more evident than ever. As startups drive economic development with innovative ideas and relentless hard work, understanding and leveraging these technologies can significantly enhance their journey. This article delves into the pivotal role AI and automation play in shaping the future of [β¦]
Spacelift has made available an on-premises edition of a platform for automating the provisioning and management of IT infrastructure that previously was only accessible via a software-as-a-service application. Company CEO Pawel Hytry said the on-premises edition of the platform satisfies both the requirements of highly regulated industries and the emergence of sovereign cloud requirements that [β¦]
Before you even think about code conversion, take a closer look at what you haveβand let generative AI (GenAI) help you explain it. Hereβs how to modernize your mainframe smarter, not just faster. The Real Challenge: Understanding Decades-Old Practices and Code If youβve worked with mainframes for any length of time, youβve seen it before: [β¦]
Goose is an innovative CLI assistant designed to automate development tasks using AI models. Docker Model Runner simplifies deploying AI models locally with Docker. Combining these technologies creates a powerful local environment with advanced AI assistance, ideal for coding and automation. Looking for a seamless way to run AI-powered development tasks locally without compromising on...
The Cloud Native Glossary is a project that aims to define cloud native concepts in clear and simple language, making them accessible to anyone without requiring any previous technical knowledge. This project thrives on open contributions...
Secure Code Warrior has made available a set of security rules for application developers using artificial intelligence (AI) tools to generate code. Company CTO Matias Madou said the AI Security Rules made available on GitHub are intended to encourage developers to review code generated by AI for security issues that these tools may inadvertently introduce. [β¦]
technical leadership is what transforms an average system into an exceptional one. Itβs what transforms scattered efforts into a cohesive strategy.
Cloud native application development can be intimidating sometimes! Architecting distributed applications that need to access and connect to complex infrastructure requires developers to learn different technologies and cloud services, which slows down their development tasks. It...
You can now attach Amazon S3 Access Points to your Amazon FSx for OpenZFS file systems so that you can access your file data as if it were in S3. With this new capability, you can work with your file data using a broad range of applications that work with S3βall without any refactoring or data movement.
AI is changing software development β but not how you think The hype is real, but so are the challenges. Here's what developers, teams, and tech leaders need to know about AIβs uneven, evolving role in software. Rumors of AIβs pervasiveness in software development have been greatly exaggerated. A look under the hood shows adoption...
Letβs explore how AI is reshaping secure DevOps, and what this means for the future of software development.
Chronosphere today added additional capabilities to its log management platform that enable DevOps teams to both reduce costs and surface more actionable insights. Alok Bhide, head of product innovation for Chronosphere, said Chronosphere Logs 2.0 provides DevOps teams with more granular control over how log data is collected and stored. The overall goal is to [β¦]
Amazon S3 now enables improved Apache Iceberg query performance through two new compaction strategiesβsort and z-orderβavailable for both S3 Tables and general purpose S3 buckets, helping organize data more efficiently by clustering similar values together and reducing file scanning during queries.
Bryce will serve as executive director of CNCF and OpenInfra Foundation in dual role SAN FRANCISCO, June 24, 2025 β The Linux Foundation, the nonprofit organization enabling mass innovation through open source, today announced the appointment...
The CNCF community represents the best of open source: innovative, passionate, diverse, and collaborative. Itβs a community reshaping how the world runs software in production, and Iβm excited to serve as the new Executive Director. I...
This edition of FYAI features Yina Arenas, Vice President of Product, Azure AI Foundry, who's leading the work to empower developers to shape the future with AI. The post FYAI: How toleverageAI toreimagine cross-functional collaboration with Yina Arenas appeared first on Microsoft Azure Blog.
Last weekβs hallmark event was the security-focused AWS re:Inforce conference. Now a tradition, the blog team wrote a re:Cap post to summarize the announcements and link to some of the top blog posts. To further summarize, several new security innovations were announced, including enhanced IAM Access Analyzer capabilities, MFA enforcement for root users, and threat [β¦]
Organizations join the cloud native movement, fostering innovation across diverse industries and global regions Open Source Summit, Denver, CO β June 23, 2025 β The Cloud Native Computing Foundation (CNCF), which builds sustainable ecosystems for cloud...
Argo Workflows is a powerful open-source container-native workflow engine designed to automate CI/CD processes by defining them as custom resources. It allows for the creation of multi-step workflows where each step runs within a container, enabling...
Kubernetes is everywhere nowadays, so are the container images and fetching the images from a private registry is a norm because of N number of reasons including security, that being the topmost. Recap Just to give...
Study participants shared that Azure provides a more efficient and effective platform for their Ubuntu workloads, maximizing their value in core business functions and supporting new technology adoption. The post IDC Business Value Study: A 306% ROI within 3 years using Ubuntu Linux on Azure appeared first on Microsoft Azure Blog.
Amazon Web Services (AWS) has added support for the Model Context Protocol (MCP) with the Visual Studio Code and JetBrains plugins that are provided for Amazon Q Developer, a set of artificial intelligence (AI) agents that automate a range of software development tasks.
Amazon Web Services (AWS) this week made Amazon Inspector, a code scanning tool for surfacing vulnerabilities that is designed to be natively integrated with GitHub and GitLab platforms, generally available. Announced at the AWS re:Inforce 2025 conference, Amazon Inspector combines a static application security testing (SAST) tool for analyzing application source-code with a software composition [β¦]
Security is a team sport: why everyone owns it now Six security takeaways from Dockerβs 2025 State of Application Development Report. In the evolving world of software development, one thing is clear β security is no longer a siloed specialty. Itβs a team sport, especially when vulnerabilities strike. Thatβs one of several key security findings...
Originally posted on KServe blog. We are thrilled to announce the release ofKServe v0.15, marking a significant leap forward in serving both predictive and generative AI models. This release introduces enhanced support for generative AI workloads,...
This blog breaks down the available pricing and deployment options, and tools that support scalable, cost-conscious AI deployments. The post Maximize your ROI for Azure OpenAI appeared first on Microsoft Azure Blog.
As AI development accelerates, developers need tools that let them move fast without having to reinvent their workflows. Docker Model Runner introduces a new specification for packaging large language models (LLMs) as OCI artifacts β a format developers already know and trust. It brings model sharing into the same workflows used for containers, with support...
The last few years have made it clear that AI models will continue to be a fundamental component of many applications. The catch is that theyβre also a fundamentally different type of component, with complex software and hardware requirements that donβt (yet) fit neatly into the constraints of container-oriented development lifecycles and architectures. To help...
Project post originally published on the Linkerd blog by Flynn. Many, many pixels have been burned on the topic of sidecars of late. If youβve been paying any attention at all to the cloud-native ecosystem, youβve...
Artificial intelligence (AI) can be a hero or an anti-hero in software development, depending on your implementation approach. According to the 2024 DORA Accelerate State of DevOps Report, AI adoption shows promise with 75% of respondents reporting positive productivity gains, but also reveals unexpected challenges, including a 7.2% reduction in software delivery stability. The key [β¦]
At AWS re:Inforce 2025 (June 16-18, Philadelphia), AWS Vice President and Chief Information Security Officer Amy Herzog delivered the keynote address, announcing new security innovations. Throughout the event, AWS announced additional security capabilities focused on simplifying security at scale and enabling organizations to build more resilient applications in the cloud. Below is a comprehensive roundup [β¦]
Expanded Amazon GuardDuty Extended Threat Detection for EKS clusters uses proprietary correlation algorithms to identify sophisticated multi-stage attack sequences across Kubernetes audit logs, container runtime behaviors, and AWS API activities through a new critical severity finding type: AttackSequence:EKS/CompromisedCluster.
AWS Security Hub has been enhanced with new capabilities that integrate multiple AWS security services to automatically discover resources, evaluate risks, analyze attack paths, and provide AI-assisted recommendations, helping security teams prioritize critical issues and respond to threats at scale with improved visualization and remediation guidance.
Multi-party approval for AWS Backup logically air-gapped vaults enables organizations to recover their backup data even when their AWS account is compromised, by creating approval teams of trusted individuals who can authorize vault sharing with a recovery account through a separate authentication path.