We use cookies and similar technologies to improve your experience, analyze site traffic, and personalize content. By clicking "Accept All", you consent to our use of cookies. You can manage your preferences or learn more in our Privacy Policy.
Privacy & Cookie Settings
We respect your privacy and give you control over your data. Choose which cookies you want to allow:
These cookies are necessary for the website to function and cannot be disabled. They are set in response to actions made by you such as setting your privacy preferences, logging in, or filling in forms.
These cookies help us understand how visitors interact with our website by collecting and reporting information anonymously. This helps us improve our services.
Providers: Google Analytics, Plausible Analytics (privacy-friendly)
These cookies are used to track visitors across websites to display relevant advertisements and measure campaign effectiveness.
Providers: LinkedIn, Twitter/X, Reddit
These cookies enable the website to remember choices you make (such as your language preference or region) to provide enhanced, more personalized features.
Your Privacy Rights
Right to Access: You can request a copy of your personal data
Right to Deletion: You can request deletion of your data
Right to Object: You can object to processing of your data
Right to Portability: You can request your data in a portable format
Kubernetes 1.1 has brought massive changes to networking with the new iptables proxy mode. We dive deep into CNI, Flannel configuration, and why the recent Safe Harbor invalidation makes running your own K8s cluster in Norway a smart move.
Docker 1.9 is changing the game, but running containers as root is a recipe for disaster. Here is the battle-tested guide to hardening your stack, surviving the 'Safe Harbor' collapse, and why KVM is your only safety net.
AWS Lambda is trending, but the recent Safe Harbor invalidation changes the game for European data. Learn how to implement serverless-style event loops using Docker 1.9 and RabbitMQ on high-performance Norwegian infrastructure.
Is your Jenkins queue blocking deployment? We analyze 2015's best practices for CI/CD performance, from tmpfs caching to Docker integration, specifically tailored for Norwegian development teams facing new data sovereignty challenges.
The container ecosystem in late 2015 is a battlefield. We benchmark Docker Swarm against the newly released Kubernetes 1.1 to determine which tool belongs on your production servers in Norway.
The 'hard shell, soft center' security model is obsolete. Following the Safe Harbor collapse, we explore implementing Zero-Trust principles on Linux systems using KVM isolation, strict iptables chains, and 2FA—because the threat is already inside.
Don't let a hardware failure become a business failure. We analyze the specific constraints of Norwegian data laws following the Safe Harbor collapse and implement a robust KVM-based recovery plan using MySQL 5.6 replication and rsync.
With the invalidation of Safe Harbor, relying on US-based clouds is a legal gamble. Learn how to automate server hardening with Ansible and OpenSCAP to satisfy Datatilsynet requirements while ensuring high-performance hosting in Norway.
The Safe Harbor ruling changed the game for Norwegian data. Learn how to tune Nginx as a high-performance API Gateway on local KVM infrastructure to handle 10k+ RPS without latency spikes.
With the recent release of Docker 1.9 and Swarm 1.0, the container orchestration battle has intensified. We benchmark Swarm against Google's Kubernetes and Apache Mesos to see which solution truly belongs in your production stack—and why your underlying hardware might be the bottleneck you ignored.
Microservices are trending, but network complexity is the silent killer. Learn how to implement a robust service discovery and load balancing layer—the precursor to a 'service mesh'—using tools available right now in late 2015.
Microservices are shifting the bottleneck to the edge. Learn how to tune Nginx, optimize Linux kernel interrupts, and leverage Norway-based KVM infrastructure to survive the Safe Harbor fallout.
With the recent invalidation of Safe Harbor, data locality is critical. Learn when to shard your MySQL architecture and why vertical scaling on Norwegian NVMe infrastructure might be the smarter move in late 2015.
With the EU-US Safe Harbor framework invalidated, Norwegian CTOs face a compliance crisis. Learn how to automate server hardening using Ansible to satisfy Datatilsynet requirements while keeping data strictly on Norwegian soil.
Monolithic architectures are stifling innovation. We explore how to deploy robust microservices using Docker 1.9 and Nginx, while addressing the critical post-Safe Harbor data sovereignty reality in Norway.
With the recent invalidation of Safe Harbor, relying on US-based cloud giants is a legal and financial risk. Learn how to optimize costs by right-sizing infrastructure, tuning MySQL 5.6 for SSDs, and leveraging Norwegian data sovereignty.
Load average is low, but your site is crawling. We dissect the hidden metrics that matter in late 2015, from CPU steal time to the Safe Harbor data residency crisis.
Microservices promise agility but often deliver complexity. Learn how to implement robust API Gateways and Service Discovery using Nginx and Docker, while navigating the recent Safe Harbor invalidation with compliant Norwegian infrastructure.
Your build server is the bottleneck. In the wake of the Safe Harbor invalidation, we analyze how moving Jenkins slaves to NVMe-backed KVM instances in Norway not only solves compliance headaches but crushes build times by 40%.
With the recent invalidation of Safe Harbor, relying on US-based 'Serverless' clouds is a legal minefield. Here is how to architect scalable, containerized microservices on Norwegian infrastructure using Docker and Nginx.
With the recent invalidation of Safe Harbor and the explosion of container adoption, default Docker configurations are a liability. We analyze kernel isolation, capability dropping, and why running containers on KVM-based VPS is the only sane choice for Norwegian data.
With the recent EU court ruling invalidating Safe Harbor, your Disaster Recovery strategy isn't just about backups—it's about data sovereignty. Here is a battle-tested technical guide to replicating MySQL and assets to Norwegian soil.
With the recent ECJ ruling invalidating Safe Harbor, your disaster recovery plan needs a legal update as much as a technical one. Here is how to architect failover systems that keep data strictly within Norway.
Monolithic architectures are dying, but microservices introduce a new nightmare: networking complexity. Learn how to architect a robust service communication layer (the precursor to a service mesh) using Consul, HAProxy, and Docker on high-performance infrastructure.
With the recent fall of Safe Harbor, data sovereignty is critical. We dissect practical Docker security hardening, from dropping kernel capabilities to ensuring true isolation with KVM.
Sharding is a last resort, not a feature. We explore architectural patterns for scaling MySQL and PostgreSQL horizontally, specifically tailored for the Norwegian infrastructure landscape post-Safe Harbor.
Manual FTP uploads are a recipe for disaster. Learn how to implement a Git-centric deployment pipeline using Jenkins, Ansible, and robust KVM virtualization to automate your infrastructure.
Is it a code memory leak or just oversold hosting? We break down the ELK stack, CPU steal time, and why the recent Safe Harbor ruling makes hosting in Oslo critical for performance and compliance.
With the recent Safe Harbor invalidation, knowing where your data lives is as critical as knowing if your server is up. We explore moving from basic monitoring to deep system introspection using ELK and Graphite on high-performance Norwegian infrastructure.
Is your API gateway choking on concurrent connections? We dive into kernel-level tuning, the brand new HTTP/2 protocol, and why the recent Safe Harbor invalidation makes local Norwegian hosting the only smart technical choice.