CloudBees invests in Kubernetes technology for enterprise DevOps

CloudBees has announced it is investing in Kubernetes technology across all areas of its business. The company is providing full support for Kubernetes in CloudBees Jenkins Enterprise, has acquired key Kubernetes talent, and has joined the Cloud Native Computing Foundation.

“Kubernetes is all about simplifying how software is built, deployed and managed. Companies also want to deploy in a cloud-agnostic way, and with every major cloud platform now supporting Kubernetes, you can pick up and run on any cloud provider you choose,” said James Strachan, senior architect at CloudBees. “The goal is to improve the developer experience and build software faster, more flexibly and more securely.”

As part of the company’s investment, it is welcoming a team of experienced Kubernetes talent and will work to develop a next-generation continuous delivery platform that will enable DevOps teams to deliver Kubernetes-native applications.

By integrating Kubernetes in CloudBees Jenkins Enterprise, organizations can now leverage investments in all environments for running DevOps workloads. This allows any developer to adopt Kubernetes and realize its benefits, according to CloudBees.

CloudBees also joined the CNCF, which is a home for collaboration on technologies such as Kubernetes.

“As enterprises evolve applications and IT environments to the cloud, CloudBees will be there to embrace them with a cloud native continuous delivery platform, built on Kubernetes,” said Sacha Labourey, CEO and co-founder of CloudBees. “We are fully committed to Kubernetes on multiple levels: engineering, product, strategic partnerships. Kubernetes permeates our company DNA. Our flagship CloudBees Jenkins Enterprise will now allow enterprises to evolve their software development and delivery seamlessly across on-premise infrastructure, private and public clouds. As the industry embraces Kubernetes, CloudBees is the only continuous delivery solution that works across all computing environments.”

All you need to know about MWC 2018

We’ve seen another announcement-packed Mobile World Congress event in Barcelona this week, with new phones launched by Samsung, Sony, LG, Nokia, Asus, and others. So what can this glut of new devices tell us about where smartphones are heading in 2018, and what we’ll see for the rest of the year?

Despite all the phones unveiled in Spain, there are plenty more to come: We’ll very likely see new flagships from Google, Apple, LG, OnePlus, Huawei, and HTC over the next 10 months, and Samsung will be back with a successor to the Galaxy Note 8. The year is just getting started.

Modern-day phone processors come with AI optimizations built inBezels are disappearing even on budget phonesMost of Nokia's new phones run stock AndroidSamsung is keeping faith with the fingerprint sensor

AI is everywhere

It’s no surprise that one of the biggest trends of 2017 rolls right into 2018 – phone makers now want to pack as much artificial intelligence into their handsets as possible, even if they have to stretch the definition of the term “AI” to do it.

The latest chips from Qualcomm, Samsung, and Huawei, among others, are built with AI computation in mind, specifically optimized to better handle the machine learning that powers a lot of the artificial intelligence processing required on modern devices.

Modern-day phone processors come with AI optimizations built in

AI can seem like quite an abstract concept, but the end result is phones that are better able to think for themselves and learn over time, without offloading the intense calculations that are required off to the cloud – being able to recognize what you’re taking a photo of, and adjusting the camera settings accordingly, is a good example of an AI-enabled feature.

Digital assistants are another example, now better than ever at recognizing your voice and interpreting your commands without having to check back with base first. More of that computing can be done on-board the phones of 2018.

e’ve also seen some impressive augmented reality demos at MWC – another 2017 trend spilling over into 2018 – and you can expect AR to be key in the new handsets we’re going to be seeing from Google and Apple later in the year. Animated, life-like emojis seem to be the order of the day, but AR has plenty of potential beyond cartoon characters.

Meanwhile, older technologies refuse to die off, despite Apple’s best efforts. Samsung’s new flagship phones include both fingerprint sensors and 3.5-mm headphone jacks, so we won’t all be switching to face unlock just yet – the first handset with a fingerprint sensor under its display has already appeared, and if the tech becomes more widely adopted, it could once again become the default way of getting into your phone.

Mobile World Congress always sets down a marker for what we can expect from the phones of the rest of the year, and 2018 has been no different – we’re looking forward to what appears next.


We are all used to entering our email address and passwords before being granted access to our online accounts. Technically, this is referred to as single-factor authentication. Today, we will look at two-factor authentication (2FA), the security process that requires a user to verify their identity in two unique ways before they are granted access to a service or system. 

What is the second factor?

The second factor is intended to bring in a layer of extra security. In addition to entering your username and password, you may be required to enter a code that is dynamically generated, has a short lifespan and can only be used once. This is referred to as “one-time password” or “OTP”. Alternatively you could use something you have such a cellphone or even your fingerprints and iris to log in. Other types include email token, where an email with a link is sent to a user who has to click on it before access is granted. Phone calls and software tokens can be used as a second factor to authenticate accesses.

Can 2FA be flawed?

Since the whole process of 2FA usually involves the transfer of security codes from one place to another, it’s possible for attackers to intercept these codes. But that said, it’s not really easy to intercept the code.

For example, the SMS-based 2FA can be flawed by tricking the user into installing an Android malware that will serve as a rogue listener for the attacker. After it’s installed, it will listen for all incoming messages on the user’s phone and then POST its content to a rogue server where the attacker can collect them. That’s extra work on the side of the server.

So yes, it can be flawed, but it requires extra effort.

Should I enable 2FA?

Even though 2FA can be flawed, enabling it can save you from a lot of harm. The advantage of enabling 2FA is that, after an attacker spends hours/days trying to crack your password; he/she can still not access your account. In situations where a company’s database is stolen by hackers, having 2FA enabled ensures that your account is still safe from the hackers.

Taking this extra step in the authentication process not only frustrates hackers, but also reduces your risk of becoming a victim of fraud or identity theft.

So yes, you should enable 2FA. It provides you with an extra security layer.