Kevin Casey

Kevin Casey

Kevin Casey writes about technology and business for a variety of publications. He won an Azbee Award, given by the American Society of Business Publication Editors, for his InformationWeek.com story, "Are You Too Old For IT?" He's a former community choice honoree in the Small Business Influencer Awards. Find him on LinkedIn and Twitter.

| Follow @kevinrcasey

Kubernetes by the numbers, in 2020: 12 stats to see

Kubernetes facts
How is Kubernetes impacting enterprise IT? Let's unpack a dozen (and then some) numbers that speak to Kubernetes' continuing...

This old COBOL app: Should you modernize it?

COBOL application modernization
COBOL recently made news as aging unemployment systems gave out. Experts share four questions IT leaders should ask when...

How to explain technical debt in plain English

Tech Debt explained
What exactly is technical debt? When discussing your organization's technical debt - and possible changes to it - with...

Kubernetes migrations: 5 troubles to dodge

Kubernetes
When migrating apps to Kubernetes, watch out for the roots of common problems. Consider these five issues and help...

Kubernetes migration: 4 secrets to a smooth move

Kubernetes: best practices for migrating applications
What do successful Kubernetes migration projects have in common? A clear strategy, a strong culture, and the proper resources...

Kubernetes deployments: 6 security best practices

Kubernetes architecture for beginners
Experts share tips on improving the overall security of your software development and deployments – at the same time...

Remote security policies: 5 essential components

remote security policy
What are the key elements of a remote access policy? Experts explain how to update or create a remote...

Managing Kubernetes: 7 things you should understand

Ship's steering wheel to represent Kubernetes
Teams can run into problems when they treat Kubernetes as a magic automation wand rather than a tool that...

Remote work: 6 common misunderstandings about online security threats

remote work security best practices
VPN, cloud, and phishing misunderstandings show up in myths about security and remote work. Security experts break down the...

Kubernetes security: New tech, familiar attack vectors

Kubernetes
With Kubernetes, some old threat vectors may feel new again. Kubernetes security experts say misconfigured settings and privilege mistakes...

Pages

x

Newsletter Sign-up

Stay on top of the latest thoughts, strategies and insights from enterprising peers.

Hybrid Cloud

CIOs: We welcome you to join the conversation