Top 25 articles selected for February 14, 2026
However, managing underlying infrastructure can be a significant operational challenge — especially for teams who want to focus on delivering software, not maintaining platforms.
GitLab | 2026-02-14Moving to the cloud, however, meant inheriting new security responsibilities that could only be solved through automation, governance, and a standardized developer experience.
HashiCorp | 2026-02-14In March 2026, Kubernetes will retire Ingress NGINX, a piece of critical infrastructure for about half of cloud native environments. There will be no more releases for bug fixes, security patches, or any updates of any kind after the project is retired.
Kubernetes | 2026-02-14Integrating ai-powered code review into ci/cd pipelines sounds good in theory where automated review catches issues before human reviewers even look, which saves time and catches stuff that might slip through manual review, but in practice there's a bunch of gotchas that come up.
Reddit | 2026-02-14For Marcus Dobeck, vice president and head of container orchestration at The PNC Financial Services Group, if the challenge of 2025 could be summarized in a single word it would be demand.
Red Hat | 2026-02-14Delivering personalized video recommendations is a common challenge for user satisfaction and long-term engagement on large-scale social platforms. Online Performance: Large-scale A/B testing with over 10 million users confirmed these improvements in real-world settings.
Engineering at Meta | 2026-02-14They deliver the highest performance and fastest memory bandwidth among comparable Intel processors in the cloud.
Amazon AWS | 2026-02-14Platform engineering strategy Their platform engineering strategy is built on four pillars: Developer experience Internal developer portal for self-service capabilities Golden paths for apps, data, and AI applications Scorecards to track platform quality and usage Security by design Security poli...
HashiCorp | 2026-02-14As 5G matures and the industry looks toward 6G and beyond, the boundaries between network and cloud infrastructures are blurring. Core themes include Cloud Native AI, observability, and security, with strong alignment to platform engineering principles.
CNCF | 2026-02-14When these services need updates, security patches can’t wait. These services handle billions of requests per day and require frequent updates for security patches, feature releases, and configuration changes.
Cloudflare | 2026-02-14Co-located with inference workloads and leveraging Dropbox’s hybrid cloud infrastructure, Dynovault avoids the delay of public internet calls and reliably delivers ~20ms client-side latency while balancing cost and geographic scalability.
Dropbox Tech | 2026-02-14feels like a whole new category of infrastructure. are you treating it differently from human-written code in terms of review and deployment gates.
Reddit | 2026-02-14So I stress-tested AGBCLOUD: tried kernel exploits, side channels, network pivoting. Full write-up on my blog – but TL;DR: they take security seriously unlike many AI platforms.
Reddit | 2026-02-14CVE-2026-22039 lets any user with namespaced Policy perms exfiltrate data from ANY namespace by abusing api Call variable substitution. 3 but this highlights how these security tools can become the biggest attack vector.
Reddit | 2026-02-14We want to make use of the new ComputeClass based Node Auto Provisioning (NAP), but when you configure the ComputeClass to also create NodePools based on workloads (with. nodePoolAutoCreation=true) it disallows setting cilium "agent-not-ready-taint" with "reserved" prefix ignore-taint.
Reddit | 2026-02-14The Key-Value (KV) Abstraction stores the latest view of nodes and edges, serving as the real-time index for all queries. Further, to ensure correctness of asynchronous deletes during concurrent updates, the Last-Write-Wins (LWW) conflict resolution mechanism is essential.
Netflix | 2026-02-14The impact was immediate: missing metadata prevented manifest generation, causing failures in our catalog service and playback issues. Emergent Issues: While each upstream data source has independent validation, problems often only manifest in the final transformed state.
Netflix | 2026-02-14We’ll outline the problems caused by prior tool fragmentation and explain how Data Bridge addresses these issues by separating user intent from implementation. A few years ago, the newly formed Data Movement Platform team was tasked with consolidating that fragmented landscape.
Netflix | 2026-02-14Telemetry now streams from every layer—health, configuration, cost, performance, and security—while programmable infrastructure enables action at machine speed. Observability agent provides continuous, full stack visibility and diagnosis across applications and infrastructure.
Microsoft Azure | 2026-02-14Hello, I’m Philippe, and I am a Principal Solutions Architect helping customers with their usage of Docker. 5B-F16 Then: I added the model in the models section of the service that runs our program.
Docker | 2026-02-14For security teams, this changes the economics of container vulnerability management. DHI includes security fixes from Docker’s security team, which simplifies security response.
Docker | 2026-02-14Docker securely manages your credentials and allows you to reuse them across multiple MCP clients. Learn more Get started with MCP Catalog and Toolkit Explore the Docker MCP Catalog: Discover containerized, security-hardened MCP servers Read more about the Docker MCP Toolkit: Official Documentation.
Docker | 2026-02-14Python alone pulls in dozens—sometimes hundreds—of third‑party libraries for even the simplest applications. Today marks the tech preview of Red Hat trusted libraries, a new package index designed to bring enterprise-grade trust, transparency, and security posture to application depe.
Red Hat | 2026-02-14In the world of enterprise software security, few metrics are as coveted, or as elusive, as "zero CVEs. Initiatives like FedRAMP and various strict security frameworks increasingly demand that software supply chains be clean of known risks before deployment.
Red Hat | 2026-02-14Most bugs, edge cases, and performance issues won't show up until after launch, when real users start hammering your application. Improving hit rates by caching more pages only helps if hot keys stay resident.
Sentry | 2026-02-14