Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

Kubecost Vs. OpenCost: What's The Difference? (Updated 2026)

Kubernetes (K8s) adoption has exploded over the past few years. But it hasn’t been easy to monitor, manage, and optimize K8s costs. To provide greater cost visibility into Kubernetes clusters and environments, Kubecost launched in 2019 and was acquired by IBM in 2024, while OpenCost debuted in 2022. OpenCost has several founding contributors. But Kubecost developed the cost allocation engine that the OpenCost implementation uses.

How Developers Build a Meaningful Career in the Age of AI

What does a meaningful developer career look like in the age of AI? We brought together four experts to answer exactly that. In this GitKon panel, GitKraken CMO Kate Adams moderates a conversation with Leon Noel (Managing Director of Engineering, Resilient Coders), Danny Thompson (Director of Technology and host of The Programming Podcast), Maggie Hunter (Recruitment Lead, GitKraken), and Dimitry Fonarev (CEO, Testkube) to explore how software engineers can future-proof their careers, grow their skills, and navigate an industry that is changing fast.

New Release of Delphi Data Access Components Adds Support for Latest IDEs, Databases, and Windows Arm64EC Target Platform

We are thrilled to announce a new release of our Delphi Data Access Components product line. This update delivers broader platform compatibility, enhanced security, and extended support for modern database technologies across multiple providers.

AI Coding Agents Break What Works

Your AI coding agent just made every test pass. Ship it, right? Not so fast. A growing class of AI-generated bugs doesn’t come from writing bad code. It comes from the AI changing working code to accommodate its own mistakes. This isn’t a theoretical risk. It’s happening now, in production codebases, and it’s harder to catch than any bug the AI might introduce from scratch.

Cloud Sovereignty: Location, Access, and Jurisdiction

Cloud residency has moved from a technical preference to a board-level control question, as organisations are being asked to evidence who can access data, under which jurisdictions, and what happens when something goes wrong across borders. A Gartner survey of CIOs and IT leaders in Western Europe found that 61% expect geopolitical factors to increase their reliance on local or regional cloud providers, while also predicting that by 2030, more than 75% of enterprises outside the US will have a digital sovereignty strategy.

Simplify bare metal operations for sovereign clouds

The way enterprises are thinking about their infrastructure has changed. Digital sovereignty of all kinds – data sovereignty, operational sovereignty, and software sovereignty – have begun to dominate the infrastructure discussion. Today, these abstract terms have become practical concerns for platform teams.

How to Harden Ubuntu SSH: From static keys to cloud identity

30 years after its introduction, Secure Shell (SSH) remains the ubiquitous gateway for administration, making it a primary target for brute force attacks and lateral movement within enterprise environments. For system administrators and security architects operating under the weight of regulatory frameworks like SOC2, HIPAA, and PCI-DSS, default SSH configurations are an “open door” that represents an unacceptable risk.