PinnedPradipta BanerjeeTransitioning back to an individual contributor roleAs they say- Change is the only constant in life.Mar 14, 20221Mar 14, 20221
Pradipta BanerjeeinITNEXTSecuring Secrets in Confidential Containers: Usage patterns to avoidHow to Ensure Your Sensitive Data Remains Protected in MemoryAug 21Aug 21
Pradipta BanerjeeConfidential Containers Attestation ImplementationFor developer’s eyes only :-)Jul 302Jul 302
Pradipta BanerjeeinITNEXTHow your confidential containers can securely retrieve secrets?Handling secrets in confidential containersJul 5Jul 5
Pradipta BanerjeeConfidential Kubernetes Clusters and ContainersUnderstanding the differencesMar 4Mar 4
Pradipta BanerjeeinITNEXTSecuring Kubernetes Workloads: A Practical Approach to Signed and Encrypted Container ImagesPodman — one tool to rule them allFeb 194Feb 194
Pradipta BanerjeeinITNEXTUsing encrypted container images in a confidential VMRun your sensitive container workload in any third-party environmentNov 20, 2023Nov 20, 2023
Pradipta BanerjeeinITNEXTA Hands-on Tekton CI/CD Pipeline Troubleshooting JourneyThis blog shares my experiences debugging a Tekton CI/CD pipeline issue when working with Kata containers runtime.Nov 14, 2023Nov 14, 2023
Pradipta BanerjeeinITNEXTA Hands-on Kubernetes Network Troubleshooting JourneyFrom frustration to nirvana when dealing with Kubernetes networking issues.Oct 20, 20232Oct 20, 20232
Pradipta BanerjeeConfidential Containers for Large Language ModelsProtect your IPAug 28, 20231Aug 28, 20231