
Changelog 3: Config sets
Configuration is at the core of every application. With these changes, we enable you to rollout shared configuration across all services in an environment.

How TPMs Work and Why We Added Support in Bottlerocket
How do servers boot automatically whilst still keeping data secure if disks are stolen? We contributed TPM support to Bottlerocket, enabling hardware-bound encryption to ensure data cannot be recovered during recycling. This is the second part about Bottlerocket's (and Molnett's) security posture.

Adding a UI to a Container Registry Is Not Simple
It turned out to be easy enough to build our own in a weekend, so we did. But building a dashboard revealed how little we actually knew about what was happening inside our registry or even how it works! Join me learning about container formats and registries in this 4 part series. This is part 1.

Trusting the Boot Process: Inside Bottlerocket's Security Architecture
As attacks grow more sophisticated, we're building a European cloud that can protect healthcare and public services without compromise. This series dissects Bottlerocket's security through every lifecycle stage. First, boot integrity: how cryptographic verification from firmware to userspace creates a trust chain where tampering is impossible to hide.

What exactly is software operations anyway?
It's a fair question! In short, software operations is the art (and sometimes the chaos) of keeping your software running smoothly, securely, and in a way that actually makes money. Imagine it as the life support system for the amazing applications that power our world.