Improving Serverless Application Performance

One of the greatest benefits of serverless is the ability to develop microservices, mobile applications, and APIs quickly and inexpensively without the complications involved with managing servers. A serverless approach can also boost your team’s productivity, and AWS services like AWS Lambda can handle scaling and high availability while costing less than running a server. However, serverless does present some challenges.


Why is Thundra the best to streamline cloud native app development?

2019 was the year of learning for the Thundra team. We’ve met with early adopters of serverless, learned a lot from them and witnessed the acceleration of serverless adoption with both greenfield and lift-and-shift projects. We had the chance to improve Thundra by focusing on feedback and inputs coming from our customers. For example; we observed that debugging serverless functions is the biggest pain point yet waiting to be addressed.


Thundra Closes $4M Series A Funding: A note from the CEO

Thundra! Thundra stepped into a new phase today, announcing Series A funding lead by Battery Ventures, new product capabilities, and my addition to the team. The appeal of Thundra for me is directly tied to the incredibly talented and dedicated people on the team and the work they are doing. This is a team purpose-built with the expertise required to address the new set of challenges enterprises face as they adopt modern microservice applications.


How to Secure Serverless Applications - Part Two

Serverless has made security much easier. However, you still need to devote energy to make your applications secure. Finally, a lot of security exploits with serverless related technologies come from misconfiguration which exposes non-public information publicly. It’s been a problem long before serverless, but now we can simply press a couple of buttons and let the fully managed power of serverless technologies do most of the work.


How to Secure Serverless Applications - Part One

This article is part of a two-part series: First off before we dive into “how” to secure your serverless applications. Let’s first talk about “why” you need to secure serverless applications. As you can imagine, just because serverless is abstracting the compute resources doesn’t mean it’s abstracting all of the security considerations. Why do I need to secure a serverless application?

Episode - 43 Containers, Serverless, and the Future of Configuration Management

Thomas Hatch is the creator of Salt and the Co-Founder of SaltStack. In this episode of Salt Air, Tom talks about how much Infrastructure has changed over the years. The cloud has taken over, AWS is releasing tons of new product month after month and most companies don't manage their own hardware anymore!

Google Cloud Platform Serverless Ingestion into Splunk

If you have or plan to collect data from Google Cloud Platform (GCP), you will have noticed that your option of ingesting data has been by using Splunk’s Google Cloud Platform Add-On. However, many customers are adopting “serverless” cloud services to deliver their cloud solutions. There are many reasons for this, but mainly it provides solutions that do not require any overheads of server or container management, that scale and is delivered as a part of their cloud platform.

Lowering the TCO of your Serverless solution with Serverless360

Total Cost of Ownership for enterprise software is the sum of all direct and indirect costs incurred by the software and is a critical part of the ROI calculation. The reality of the cloud support process is that the user will end up paying more money depending upon the severity of the problem. For Instance, the support ticket resolved by 1st or 2nd line support teams would cost less than being resolved by the Architecture team.