Open in app

Sign in

Write

Sign in

Mastodon
Pradipta Banerjee
Pradipta Banerjee

298 Followers

Home

About

Pinned

Transitioning back to an individual contributor role

As they say- Change is the only constant in life. This narrative holds true not only in our personal life but even in our work sphere. We constantly strive towards change. A change that helps us evolve, get closer to our goals in life, thereby making us happy and peaceful. …

Career Advice

4 min read

Transitioning back to an individual contributor role
Transitioning back to an individual contributor role
Career Advice

4 min read


Nov 20

Using encrypted container images in a confidential VM

Let’s say you must run your sensitive workload in a third-party infrastructure as part of your business needs, and you want to leverage a confidential computing (CC) environment to protect your intellectual property (IP) in the workload. …

Confidential Computing

11 min read

Using encrypted container images in a confidential VM
Using encrypted container images in a confidential VM
Confidential Computing

11 min read


Published in

ITNEXT

·Nov 14

A Hands-on Tekton CI/CD Pipeline Troubleshooting Journey

In this blog, I will share my experience debugging an issue related to Tekton CI/CD pipelines. I faced this issue while working on the confidential containers project using the Kata/remote-hypervisor approach. Before delving further, let me provide a quick primer on Tekton pipelines. …

Kata

14 min read

A Hands-on Tekton CI/CD Pipeline Troubleshooting Journey
A Hands-on Tekton CI/CD Pipeline Troubleshooting Journey
Kata

14 min read


Published in

ITNEXT

·Oct 20

A Hands-on Kubernetes Network Troubleshooting Journey

While developing the Kata/remote-hypervisor (aka peer-pods) approach, I encountered an issue where the Kubernetes pod IP was unreachable from the worker node. In this blog, I describe the Kubernetes network troubleshooting journey, believing it’ll be helpful to my readers. Kata remote hypervisor (peer-pods) approach enables the creation of Kata VMs…

Kubernetes

14 min read

A Hands-on Kubernetes Network Troubleshooting Journey
A Hands-on Kubernetes Network Troubleshooting Journey
Kubernetes

14 min read


Aug 28

Confidential Containers for Large Language Models

Protect your IP — Large Language Models (LLMs) have garnered significant attention, partly due to ChatGPT and most notably due to their remarkable capabilities in natural language processing (NLP) applications, such as text generation, question answering, etc. There are excellent materials available on the internet to understand LLMs. In this blog, I’ll focus on…

Confidential Containers

5 min read

Confidential Containers for Large Language Models
Confidential Containers for Large Language Models
Confidential Containers

5 min read


Published in

ITNEXT

·Jul 24

Innovative ways to use Weighted Canary Deployments and Multiple Container Runtimes in Kubernetes

Unleashing newer possibilities — Combining different Kubernetes features creatively have the potential to provide solutions to some very tricky problems. In this blog, I’ll share how you can combine the power of weighted canary deployment and multiple container runtimes in Kubernetes and solve some tricky issues. Although ingress controllers in Kubernetes already provide traffic-splitting…

Kubernetes

4 min read

Innovative ways to use Weighted Canary Deployments and Multiple Container Runtimes in Kubernetes
Innovative ways to use Weighted Canary Deployments and Multiple Container Runtimes in Kubernetes
Kubernetes

4 min read


Published in

ITNEXT

·Jul 11

Confidential Containers in Kubernetes

Simplifying Adoption through Standardisation — Introduction Confidential computing is becoming increasingly important for organisations that handle sensitive data. With the rising adoption of Kubernetes, standardising confidential computing at the pod layer for container workloads will benefit users. The Cloud Native Computing Foundation’s (CNCF) Confidential Containers (CoCo) project aims to address this need by providing a standardised…

Confidential Computing

6 min read

Confidential Containers in Kubernetes
Confidential Containers in Kubernetes
Confidential Computing

6 min read


Jun 28

The Evolution of Confidential Computing: Empowering New Business Workloads

Introduction In recent years, the computing landscape has significantly shifted towards addressing growing data privacy and security concerns. Confidential computing, a paradigm that aims to protect sensitive data during processing, has emerged as a powerful solution. …

Confidential Computing

5 min read

The Evolution of Confidential Computing: Empowering New Business Workloads
The Evolution of Confidential Computing: Empowering New Business Workloads
Confidential Computing

5 min read


Published in

ITNEXT

·Mar 24

Enhancing Kubernetes Security with Kyverno, RuntimeClass, and Kata Containers

Flexibility without Compromise — As more organizations adopt Kubernetes, security has become a major concern. Kubernetes has many built-in security features, but ensuring security policies are properly enforced across a large and complex cluster can be challenging. At the same time, Kubernetes also needs to provide the flexibility required for developers to work efficiently…

Kata

5 min read

Enhancing Kubernetes Security with Kyverno, RuntimeClass, and Kata Containers
Enhancing Kubernetes Security with Kyverno, RuntimeClass, and Kata Containers
Kata

5 min read


Feb 26

From Sandboxed Containers to Confidential Containers — Part-2

In the first part of this series, we learnt about sandboxed (virtualised) containers and how it provides an added layer of security to container workloads by running the pod in a virtual machine (VM). We also examined how sandboxed containers, implemented in Kata containers, provide the foundation for confidential containers…

Confidential Computing

5 min read

From Sandboxed Containers to Confidential Containers — Part-2
From Sandboxed Containers to Confidential Containers — Part-2
Confidential Computing

5 min read

Pradipta Banerjee

Pradipta Banerjee

298 Followers

Writes about technology | Startup advisor & mentor. www.linkedin.com/in/bpradipt

Following
  • Nicolas Cole

    Nicolas Cole

  • Niharikaa Kaur Sodhi

    Niharikaa Kaur Sodhi

  • Pavan Belagatti

    Pavan Belagatti

  • Ayodeji Awosika

    Ayodeji Awosika

  • Tim Denning

    Tim Denning

See all (40)

Help

Status

About

Careers

Blog

Privacy

Terms

Text to speech

Teams