Blog Posts

Explore insights, best practices, and lessons learned from the Elastisys team. Learn about cloud native operations, platform engineering, and security from people who build and run them every day.

CKAD training with Elsatisys and Elastx

Benefits of Kubernetes App Developer Training and Certification with Elastisys and Elastx 

Discover the benefits of Kubernetes Application Developer training and certification with Elastisys and Elastx. Learn about course content, hands-on labs, expert instructors, and how this training can enhance your Cloud Native skills and prepare you for the CKAD exam. Plus, get insights into the training experience and location in central Stockholm.

Benefits of Kubernetes App Developer Training and Certification with Elastisys and Elastx  Read More »

7-step-innovation-process featured image

The 7-step Innovation Process

For decades, the “build-measure-learn” mantra guided SaaS innovation. Today, compliance with regulations is crucial, especially in sectors critical to society like healthcare. This blog presents Swelife’s 7-step innovation process, blending creativity with compliance. From clarifying ideas and mapping information flow to meeting regulatory requirements, learn how to innovate smartly and securely in today’s landscape.

The 7-step Innovation Process Read More »

cybersecurity trends 2024

Cybersecurity Trends 2024 – How Can We Face the Threats Together?

Cybersecurity Trends 2024 – How Can We Face the Threats Together? Elastisys recently brought together top cybersecurity experts in Norrland (Northern Sweden), including those in charge of critical societal services, suppliers to these services, and other industry professionals, for an insightful discussion. The meeting focused on current events, emerging trends, and evolving cybersecurity needs. What

Cybersecurity Trends 2024 – How Can We Face the Threats Together? Read More »

Cross-provider disaster recovery

Secure Kubernetes Operational Practices: Cross-provider Disaster Recovery

Say your cloud provider is ransomware attacked. Switching regions won’t help: those are compromised, too. Learn how Elastisys implements “cross-provider” disaster recovery for our customers, which is great for all customers, and in particular those in sectors of high criticality (NIS2).

Secure Kubernetes Operational Practices: Cross-provider Disaster Recovery Read More »

Leveraging Kubernetes to Run Databases, Message Queues, and In-Memory Caches How We Built a Truly Portable Platform

Leveraging Kubernetes to Run Databases, Message Queues, and In-Memory Caches: How We Built a Truly Portable Platform

This blog shows how standardising on Kubernetes lets you run databases, message queues and caches securely across any cloud or on-premise environment, and explains how operators and built-in Kubernetes capabilities make it possible to build a truly portable, future-proof platform.

Leveraging Kubernetes to Run Databases, Message Queues, and In-Memory Caches: How We Built a Truly Portable Platform Read More »

Scroll to Top