[{"data":1,"prerenderedAt":107},["ShallowReactive",2],{"index":3,"mdc-fjswyz-key":95},{"id":4,"title":5,"body":6,"certifications":71,"cta":74,"description":7,"extension":78,"features":79,"hero":12,"meta":90,"navigation":10,"path":91,"sections":12,"seo":92,"stem":93,"testimonials":12,"__hash__":94},"index\u002F0.index.yml","Tessellative Solutions",{"title":5,"description":7,"seo":8,"navigation":10,"features":11,"cta":50,"certifications":64},"building maintainable, secure and scalable production ready software platforms with open source technologies",{"title":5,"description":9},"Tessellative Solutions helps companies build secure, scalable cloud platforms using Kubernetes, GitOps, DevOps, DevSecOps, and open-source technologies. Expert cloud migration, security, and productionization services in Switzerland.",false,{"title":12,"description":12,"items":13},null,[14,18,22,26,30,34,38,42,46],{"title":15,"description":16,"icon":17},"Cloud Consulting","helping customers to understand and implement the right steps towards the cloud","i-lucide-user-search",{"title":19,"description":20,"icon":21},"Dev[Sec]Ops","package management, release lifecycle management, dynamic staged environments, secure pipelines","i-lucide-container",{"title":23,"description":24,"icon":25},"Software Productionization","preparation of production rollouts, release management, white box analysis through scalability, observability, availability","i-lucide-wrench",{"title":27,"description":28,"icon":29},"Cloud Migration","private \u003C-> hybrid \u003C-> public","i-lucide-cloud-cog",{"title":31,"description":32,"icon":33},"Secret Management","storing and sharing various technical secrets, certificates, passwords, tokens, api-keys","i-lucide-key-round",{"title":35,"description":36,"icon":37},"Supply Chain Security","software composition analysis, isolating and securing CI\u002FCD pipeline executions","i-lucide-hat-glasses",{"title":39,"description":40,"icon":41},"IaC and CasC","Deterministic and maintainable GitOps based environment setup and configuration management","i-lucide-monitor-cog",{"title":43,"description":44,"icon":45},"Cloud Security","zero trust architectures, identity management, access control management, encryption at runtime and rest, HSM Integration","i-lucide-shield-check",{"title":47,"description":48,"icon":49},"Kubernetes and Open Source","utilization of open source technologies in the cloud, powered by Kubernetes","i-lucide-blocks",{"title":51,"description":52,"links":53},"Ready to build something?!","Check out our blogs and repos",[54,58],{"label":55,"to":56,"trailingIcon":57},"Blog","\u002Fblog","i-lucide-arrow-right",{"label":59,"to":60,"target":61,"variant":62,"icon":63},"View on Codeberg","https:\u002F\u002Fcodeberg.org\u002Ftessellative","_blank","subtle","i-simple-icons-codeberg",[65,68],{"name":66,"icon":67},"CNCF CKA","\u002Ficons\u002Fkubernetes-cka-color.svg",{"name":69,"icon":70},"CNCF CKS","\u002Ficons\u002Fkubernetes-security-specialist-logo.svg",[72,73],{"name":66,"icon":67},{"name":69,"icon":70},{"title":51,"description":52,"links":75},[76,77],{"label":55,"to":56,"trailingIcon":57},{"label":59,"to":60,"target":61,"variant":62,"icon":63},"yml",{"title":12,"description":12,"items":80},[81,82,83,84,85,86,87,88,89],{"title":15,"description":16,"icon":17},{"title":19,"description":20,"icon":21},{"title":23,"description":24,"icon":25},{"title":27,"description":28,"icon":29},{"title":31,"description":32,"icon":33},{"title":35,"description":36,"icon":37},{"title":39,"description":40,"icon":41},{"title":43,"description":44,"icon":45},{"title":47,"description":48,"icon":49},{},"\u002F",{"title":5,"description":9},"0.index","p8UQdEbSsV71nQKGCqo6LCvXLCBuQBbvNZ89LYwBghU",{"data":96,"body":97},{},{"type":98,"children":99},"root",[100],{"type":101,"tag":102,"props":103,"children":104},"element","p",{},[105],{"type":106,"value":5},"text",1775246534850]