Operations | Monitoring | ITSM | DevOps | Cloud

KubeCon EU 2026 Recap Party

KubeCon EU 2026 is done. Now let’s talk about what actually mattered. This recap session covers the biggest announcements, the talks everyone’s still discussing, and the trends that look like they’ll stick. From Kubernetes and platform engineering to GitOps and security, we’ll break down the practical takeaways and call out the overhyped moments. If you want a straight summary without the marketing spin, this is it.

Performance Testing vs Load Testing: Simple Difference

Learn the clear difference between performance testing and load testing in this quick video. Performance testing checks how well your software works under different conditions like speed, stability, and scalability. Load testing focuses only on how the system handles expected user traffic. If you want to build reliable applications, knowing these two helps you test smarter. Perfect for developers, testers, and QA teams.

Architecture deep dive: What makes a bug reproducible?

The most difficult bugs to solve aren't those with the most complex code, but those with the most complex state. For a bug to be "reproducible," it must be deterministic, meaning the same set of inputs always yields the same failure. In a modern cloud environment, those "inputs" include more than just your code; they include the specific version of your database, the latency of your service mesh, and the exact configuration of your underlying infrastructure.

FinOps Roles And Responsibilities: Building Your Cloud FinOps Team (2026)

Quick answer: FinOps roles and responsibilities typically span four core functions: FinOps analyst (hands-on cost analysis and anomaly detection), FinOps engineer (resource tagging, automation, and rightsizing), FinOps architect (process design and optimization frameworks), and FinOps lead (program ownership, C-suite alignment, and cross-team accountability).

Profiling Java apps: breaking things to prove it works

Coroot already does eBPF-based CPU profiling for Java. It catches CPU hotspots well, but that's all it can do. Every time we looked at a GC pressure issue or a latency spike caused by lock contention, we could see something was wrong but not what. We wanted memory allocation and lock contention profiling. So we decided to add async-profiler support to coroot-node-agent. The goal: memory allocation and lock contention profiles for any HotSpot JVM, with zero code changes. Here's how we got there.

When we say "Observability AI Reckoning," what are we actually talking about?

We’ve spent the last decade collecting more telemetry. Now AI is analyzing it. Here’s the catch: AI needs the full dependency chain to reason correctly. If it sees spans but not storage contention… Services but not Kubernetes scheduling… Frontend metrics but not downstream providers… It will confidently optimize the wrong thing. AI doesn’t lower the need for observability. It raises the standard.

Streaming Video Monitoring: How to Detect Playback Issues Before Viewers Leave

Video is the single largest driver of internet traffic worldwide. According to the Sandvine Global Internet Phenomena Report, video accounts for 65% of all internet traffic, with on-demand streaming alone consuming over half of all downstream bandwidth on fixed networks. In the United States, households spend nearly five hours per day streaming content, and 94.6% of internet users worldwide watch online video monthly.

Authentication vs Authorization: What's the Difference and Why It Matters | Harness Blog

‍ Let's get something out of the way: authentication and authorization are not the same thing. We know, we know. People swap the two terms constantly. And honestly, it's easy to see why. They both start with "auth," they both deal with security, and they often show up in the same conversations on access control. But if you build or secure software, blurring the line between authentication and authorization is how you end up with a system where everyone is logged in and everyone is an admin.