PinnedPradipta BanerjeeTransitioning back to an individual contributor roleAs they say- Change is the only constant in life.Mar 14, 20221Mar 14, 20221
Pradipta BanerjeeConfidential Kubernetes Clusters and ContainersUnderstanding the differencesMar 4Mar 4
Pradipta BanerjeeinITNEXTSecuring Kubernetes Workloads: A Practical Approach to Signed and Encrypted Container ImagesPodman — one tool to rule them allFeb 194Feb 194
Pradipta BanerjeeinITNEXTUsing encrypted container images in a confidential VMRun your sensitive container workload in any third-party environmentNov 20, 2023Nov 20, 2023
Pradipta BanerjeeinITNEXTA Hands-on Tekton CI/CD Pipeline Troubleshooting JourneyThis blog shares my experiences debugging a Tekton CI/CD pipeline issue when working with Kata containers runtime.Nov 14, 2023Nov 14, 2023
Pradipta BanerjeeinITNEXTA Hands-on Kubernetes Network Troubleshooting JourneyFrom frustration to nirvana when dealing with Kubernetes networking issues.Oct 20, 20232Oct 20, 20232
Pradipta BanerjeeConfidential Containers for Large Language ModelsProtect your IPAug 28, 20231Aug 28, 20231
Pradipta BanerjeeinITNEXTInnovative ways to use Weighted Canary Deployments and Multiple Container Runtimes in KubernetesUnleashing newer possibilitiesJul 24, 2023Jul 24, 2023
Pradipta BanerjeeinITNEXTConfidential Containers in KubernetesSimplifying Adoption through StandardisationJul 11, 2023Jul 11, 2023
Pradipta BanerjeeThe Evolution of Confidential Computing: Empowering New Business WorkloadsJun 28, 2023Jun 28, 2023