We use cookies and similar technologies to improve your experience, analyze site traffic, and personalize content. By clicking "Accept All", you consent to our use of cookies. You can manage your preferences or learn more in our Privacy Policy.
Privacy & Cookie Settings
We respect your privacy and give you control over your data. Choose which cookies you want to allow:
These cookies are necessary for the website to function and cannot be disabled. They are set in response to actions made by you such as setting your privacy preferences, logging in, or filling in forms.
These cookies help us understand how visitors interact with our website by collecting and reporting information anonymously. This helps us improve our services.
Providers: Google Analytics, Plausible Analytics (privacy-friendly)
These cookies are used to track visitors across websites to display relevant advertisements and measure campaign effectiveness.
Providers: LinkedIn, Twitter/X, Reddit
These cookies enable the website to remember choices you make (such as your language preference or region) to provide enhanced, more personalized features.
Your Privacy Rights
Right to Access: You can request a copy of your personal data
Right to Deletion: You can request deletion of your data
Right to Object: You can object to processing of your data
Right to Portability: You can request your data in a portable format
Vertical scaling has a ceiling. When your MySQL instance starts choking on write-heavy loads, it's time to talk about sharding. We explore consistent hashing, topology planning, and why network latency in Oslo matters more than you think.
A deep dive into the chaotic world of Kubernetes networking, CNI plugins, and iptables hell. Learn how to optimize pod communication without sacrificing latency, specifically tailored for Norwegian infrastructure.
With the Safe Harbor framework invalidated and new EU regulations looming, manual security hardening is a liability. Learn how to automate server compliance using Ansible on CentOS 7 to satisfy auditors and secure your Nordic infrastructure.
Is your application hanging? Most devs blame the database, but the culprit is often the infrastructure. We dive deep into APM strategies using ELK, system tuning, and why hardware isolation matters in 2016.
It is October 2016, and everyone is rushing to containerize. But default Docker settings are a security nightmare waiting to happen. Here is how to harden your stack using namespaces, capabilities, and KVM isolation.
With the EU's new data protection regulations looming, manual server hardening is a liability. Learn how to automate security compliance using Ansible on strict KVM infrastructure.
Is your Jenkins build taking 20 minutes? In 2016, developer idle time is the biggest budget killer. We dissect I/O bottlenecks, Docker caching strategies, and why raw NVMe power in Norway is the secret to sub-minute deployments.
Docker is revolutionizing deployment, but default configurations are a security nightmare. Learn how to lock down your containers, drop capabilities, and why KVM virtualization is your last line of defense.
It is late 2016. Safe Harbor is dead, ransomware is rampant, and your RTO is likely a lie. Here is how to build a battle-tested Disaster Recovery plan using KVM, NVMe, and Norwegian data sovereignty.
Moving from monolith to microservices requires more than just Docker. We explore critical patterns like Service Discovery with Consul, API Gateways with NGINX, and why infrastructure latency defines success in the Nordic market.
Speed of light is a hard limit. In 2016, moving processing power to the edge—right here in Oslo—is the only way to solve the latency crisis for IoT and real-time apps.
With the recent invalidation of Safe Harbor and the looming EU Data Protection Reform, manual security is a liability. Learn how to automate server hardening on CentOS 7 and Ubuntu 16.04 using Ansible to satisfy Datatilsynet requirements.
Top doesn't tell the whole story. Discover how to identify bottlenecks using Nginx custom logging, PHP-FPM slow logs, and the ELK stack, while ensuring data compliance in Norway.
Default configurations are killing your API performance. We dive deep into kernel tuning, HTTP/2 optimizations, and connection pooling on Ubuntu 16.04 to handle thousands of concurrent requests without melting your CPU.
It's September 2016, and Docker is everywhere. But most deployments in Norway are fundamentally insecure. Here is the battle-hardened guide to locking down your containers before you leak data.
Manual security checklists are a liability. Learn how to automate server hardening for the upcoming GDPR regulations using Ansible, OpenSCAP, and Norwegian-hosted KVM infrastructure.
A battle-hardened look at Kubernetes 1.3 networking, CNI plugins, and why overlay networks might be killing your latency. Learn how to configure kube-proxy properly on Norwegian infrastructure.
With the General Data Protection Regulation looming and Safe Harbor dead, manual security hardening is a liability. Here is how to automate server compliance using Ansible on Norwegian infrastructure.
A battle-hardened look at the Kubernetes 1.3 network model. We break down CNI, overlay trade-offs, and why low-latency infrastructure is critical for microservices in the Nordic region.
Why your Zabbix or Graphite instance is choking on disk writes, and how to architect a high-availability monitoring stack using NVMe storage and proper database tuning in a post-Safe Harbor Europe.
It is 2016. Centralized cloud regions in Frankfurt or Dublin are no longer sufficient for real-time applications in the Nordics. We explore the technical necessity of local edge nodes, kernel tuning for low latency, and why geography is the ultimate bottleneck.
A deep dive into kernel-level optimizations and Nginx configuration strategies to handle high-concurrency API traffic, specifically tailored for the Nordic infrastructure landscape of 2016.
Latency kills conversion. We explore practical edge computing architectures available today—from MQTT aggregation to Varnish caching—to keep your Norwegian traffic fast and compliant.
The 'Castle and Moat' security model has failed. Learn how to architect a Zero-Trust environment using strict iptables, 2FA, and segmented networks on CoolVDS infrastructure. Stop trusting your LAN.
With Safe Harbor dead and the GDPR clock ticking, manual server hardening is a liability. Here is how to use Ansible and OpenSCAP to enforce Norwegian compliance standards on CentOS 7.
In 2016, a green status icon is not enough. Learn why traditional monitoring fails high-load systems, how to implement 'Whitebox' monitoring with Prometheus 1.0 and ELK, and why NVMe storage is the bottleneck you didn't know you had.
Waiting 30 minutes for a build to fail is a productivity killer. We dive into Jenkins 2.0 pipelines, Docker layer caching, and why NVMe storage is the secret weapon for Norwegian DevOps teams facing I/O bottlenecks.
Docker is revolutionizing deployment, but default settings are a security nightmare. We dive into kernel capabilities, user namespaces, and why KVM isolation is critical for Norwegian data integrity.
Nagios says your server is up, but your customers are seeing 504s. In the era of microservices, simple ping checks are obsolete. Here is how to implement white-box monitoring and aggregated logging using the ELK stack on high-performance KVM instances.
It is July 2016, and Docker 1.12 has just dropped. But before you deploy Swarm mode, understand why running containers as root is a disaster waiting to happen. A deep dive into capabilities, CoW filesystems, and Norwegian data sovereignty.