Join us

ContentUpdates and recent posts about Kata Containers..
Link
@varbear shared a link, 2 months, 3 weeks ago
FAUN.dev()

Company as Code

Organisations rely heavily on digital systems, yet manage important organisational data using outdated manual methods despite advanced automation capabilities in other areas. A novel "Company as Code" concept proposes a programmatic representation of the entire organisation, enabling structured, ver.. read more  

Link
@kaptain shared a link, 2 months, 3 weeks ago
FAUN.dev()

How Kubernetes Learned to Resize Pods Without Restarting Them

Kubernetes v1.35 introduces in-place Pod resizing, allowing dynamic adjustments to CPU and memory limits without restarting containers. This feature addresses the operational gap of vertical scaling in Kubernetes by maintaining the same Pod UID and workload identity during resizing. With this breakt.. read more  

How Kubernetes Learned to Resize Pods Without Restarting Them
Link
@kaptain shared a link, 2 months, 3 weeks ago
FAUN.dev()

How GKE Inference Gateway improved latency for Vertex AI

Vertex AI now plays nice withGKE Inference Gateway, hooking into the Kubernetes Gateway API to manage serious generative AI workloads. What’s new:load-awareandcontent-aware routing. It pulls from Prometheus metrics and leverages KV cache context to keep latency low and throughput high - exactly what.. read more  

How GKE Inference Gateway improved latency for Vertex AI
Link
@kaptain shared a link, 2 months, 3 weeks ago
FAUN.dev()

Why Kubernetes is retiring Ingress NGINX

The Kubernetes Steering Committee is pulling the plug onIngress NGINX- official support ends March 2026. No more updates. No security patches. Gone. Why? It's been coasting on fumes. One or two part-time maintainers couldn't keep up. The tech debt piled up. Now it's a security liability. What's next.. read more  

Why Kubernetes is retiring Ingress NGINX
Link
@kaptain shared a link, 2 months, 3 weeks ago
FAUN.dev()

CVE-2026-22039: Kyverno Authorization Bypass

Kyverno - a CNCF policy engine for Kubernetes - just dropped a critical one:CVE-2026-22039. It lets limited-access users jump namespaces by hijacking Kyverno'scluster-wide ServiceAccountthrough crafty use of policy context variable substitution. Think privilege escalation without breaking a sweat. I.. read more  

CVE-2026-22039: Kyverno Authorization Bypass
Link
@kaptain shared a link, 2 months, 3 weeks ago
FAUN.dev()

Introducing Node Readiness Controller

Kubernetes just dropped theNode Readiness Controller- a smarter way to track node health. It slaps taints on nodes based on custom signals, not just the plain old "Ready" status. The goal? Safer pod scheduling that actually reflects what’s going on under the hood. It's powered by theNodeReadinessRul.. read more  

Link
@kala shared a link, 2 months, 3 weeks ago
FAUN.dev()

Towards self-driving codebases

OpenAI spun up a swarm of GPT-5.x agents - thousands of them. Over a week-long sprint, they cranked out runnable browser code and shipped it nonstop. The system hit 1,000 commits an hour across 10 million tool calls. The architecture? A planner-worker stack. Hierarchical. Recursive. Lean on agent ch.. read more  

Towards self-driving codebases
Link
@kala shared a link, 2 months, 3 weeks ago
FAUN.dev()

Generative Pen-trained Transformer

MeetGPenT, an open-source, wall-mounted polargraph pen plotter with a flair for generative art. It blends custom hardware, Marlin firmware, a Flask web UI running on Raspberry Pi, and Gemini-generated drawing prompts. The stack? Machina + LLM. Prompts go in, JSON drawing commands come out. That driv.. read more  

Link
@kala shared a link, 2 months, 3 weeks ago
FAUN.dev()

My AI Adoption Journey

A dev walks through the shift from chatbot coding toagent-based AI workflows, think agents that read files, run code, and double-check their work. Things only clicked once they built outcustom tools and configsto help agents spot and fix their own screwups. That’s the real unlock... read more  

Link
@kala shared a link, 2 months, 3 weeks ago
FAUN.dev()

Nathan Lambert: Open Models Will Never Catch Up

Open models will be the engine for the next ten years of AI research, according to Nathan Lambert, a research scientist at AI2. He explains that while open models may not catch up with closed ones due to fewer resources, they are still crucial for innovation. Lambert emphasizes the importance of int.. read more  

Nathan Lambert: Open Models Will Never Catch Up
Kata Containers is a Cloud Native Computing Foundation (CNCF) project designed to close the security gap between traditional Linux containers and virtual machines. Instead of sharing a single host kernel like standard containers, Kata Containers launches each pod or container inside its own lightweight virtual machine using hardware virtualization.

This approach dramatically reduces the attack surface and prevents container escape vulnerabilities, making Kata ideal for multi-tenant, untrusted, or sensitive workloads. Despite using VMs under the hood, Kata is optimized for fast startup times and integrates seamlessly with Kubernetes through the Container Runtime Interface (CRI), allowing it to be used alongside runtimes like containerd and CRI-O.

Kata Containers is commonly used in scenarios such as multi-tenant Kubernetes clusters, confidential computing, sandboxed AI workloads, serverless platforms, and agent execution environments where strong isolation is mandatory. It supports multiple hypervisors, including QEMU, Firecracker, and Cloud Hypervisor, and continues to evolve toward faster boot times, lower memory overhead, and better hardware acceleration support.