The Configuration of an Encryption Key — Post-Modern Evolution

The Configuration of an Encryption Key — Post-Modern Evolution

Jean-Baptiste Doumenjou
·
Access Control
·
November, 2022

This is the third and last part of our journey through time to discover the art of cryptography and the configuration of an encryption key, from ancient times until today.

Traefik Enterprise Accelerates and Consolidates ABAX's Journey to the Cloud

Traefik Enterprise Accelerates and Consolidates ABAX's Journey to the Cloud

Traefik Labs
·
Case Studies
·
November, 2022

With the help of Traefik Enterprise, ABAX completed its cloud migration and reaped the benefits of a cloud native networking solution.

The Evolution of Cryptography in Modern History

The Evolution of Cryptography in Modern History

Jean-Baptiste Doumenjou
·
Access Control
·
November, 2022

Jump into our time machine and join us on a journey to explore the evolution of cryptography, the art of making a message secret through history.

The Art of Cryptography in Ancient and Medieval History

The Art of Cryptography in Ancient and Medieval History

Jean-Baptiste Doumenjou
·
Access Control
·
November, 2022

We invite you to jump into a time machine and join us on a journey to discover cryptography, the art of making a message secret through history.

9 Best Practices for Designing Microservice Architectures

9 Best Practices for Designing Microservice Architectures

Manuel Zapf
·
Microservices
·
October, 2022

It is not easy to maintain a resilient network in microservices-based architectures. Here, we discuss 9 best practices for designing microservices that operate efficiently and effectively.

Announcing the General Availability of Traefik Hub 1.0

Announcing the General Availability of Traefik Hub 1.0

Emile Vauge
·
Product News
·
October, 2022

We are thrilled to announce the general availability of Traefik Hub which adds exciting new capabilities.

Kicking Off Traefik Proxy 3.0 With Style — Meet Your Hackaethon Winners

Kicking Off Traefik Proxy 3.0 With Style — Meet Your Hackaethon Winners

Tiffany Long
·
Product News
·
October, 2022

The Traefik Proxy 3.0 Hackaethon is officially a wrap! Our judges carefully reviewed and analyzed the submitted projects, and we are proud to present the winners.

Centralizing and Standardizing OIDC at the API Gateway Level

Centralizing and Standardizing OIDC at the API Gateway Level

Matt Elgin
·
Access Control
·
October, 2022

Anyone with experience managing computer systems knows the importance of identity and access management (IAM). In this blog post, we will discuss the evolution of IAM.

Exploring Advanced Load Balancing in Kubernetes with Traefik Proxy

Exploring Advanced Load Balancing in Kubernetes with Traefik Proxy

Jakub Hajek
·
Load Balancing
·
October, 2022

In this article, we explore all the methods and benefits of advanced load balancing in Kubernetes that are introduced by Traefik Proxy.

Traefik Labs uses cookies to improve your experience. By continuing to browse the site you are agreeing to our use of cookies. Find out more in the Cookie Policy.