News

What is DevOps? Bridget Kromhout Explains

Bridget Kromhout can be found traveling and speaking at conferences on a variety of DevOps topics. She is a global core organizer for devopsdays and is on the program committee for Velocity in addition to organizing local tech meetups in Minneapolis. She is a Principal Technologist for Cloud...
Read 0 Comments

Red Hat Platform-as-a-Service Cloud Loves Containers

When Red Hat launched its OpenShift Platform as a Service (PaaS) cloud in 2013, the focus was on making life easier for developers. OpenShift's theme remains the same but Red Hat has made it crystal clear that developing on the cloud today means using containers. The name says it all: Red Hat...
Read 0 Comments

SDN Platforms Boron, Hummingbird Released

Seen by some as competing for supremacy in the software-defined networking (SDN) controller space, the ONOS Project and the OpenDaylight Project just released respective platforms within one day of another. Today, the ONOS Project announced its eighth quarterly platform release, called Hummingbird...
Read 0 Comments

Containerized Production Environments: Networking, Security, and Storage

So you have an application that is composed around containers. You have lightweight base images, a centralized container registry, and integration with the deployment and continuous integration (CI) pipeline — everything needed to get containers working at full scale on your hardware. For running a...
Read 0 Comments

matthew-garrett-linux-security.png

Matthew Garrett
Security of the boot chain is a vital component of any other security solution, said Matthew Garrett of CoreOS in his presentation at Linux Security Summit.

Matthew Garrett Explains How to Increase Security at Boot Time

Security of the boot chain is a vital component of any other security solution, said Matthew Garrett of CoreOS in his presentation at Linux Security Summit. If someone is able to tamper with your boot chain then any other security functionality can be subverted. And, if someone can interfere with...
Read 0 Comments

openstack-support.jpg

OpenStack support
OpenStack distribution vendors compete on support offerings.

Support Is Now the Differentiator in the OpenStack Race

When it comes to OpenStack cloud computing distributions, now offered by a variety of vendors, we are at a tipping point. As businesses and organizations demand flexible solutions for deploying cloud solutions based on OpenStack, competition is fierce.  With so many vendors competing in this arena...
Read 0 Comments

elastic-stack.jpg

Elastic Stack
Giovanni Bechis, explains how ELK can be used to aggregate any kind of data in a productive way, in this preview of his upcoming talk at LinuxCon Europe.

Managing Log Files and More With Elastic Stack

Managing log files is becoming increasingly harder with growing amounts of data and differing file formats. Giovanni Bechis, in his upcoming talk at LinuxCon Europe, describes a solution using the ELK stack (ElasticSearch, Logstash, Kibana), which he says let's you easily collect, parse, and manage...
Read 3 Comments

Object Storage Leading the Advancement of Software-Defined Storage

Software-defined storage (SDS) is one of those terms that has been readily hijacked by vendors over the past few years. The term developed from the adoption of software-defined networking (SDN), used to define the separation of control and data traffic in the networking world, which provides the...
Read 0 Comments

National Software Reference Library: An Important Digital Tool for Forensic Investigators

The story starts with Stephen M. Cabrinety, the Stanford University Libraries, and NIST's National Software Reference Library (NSRL). Cabrinety collected more than 50,000 pieces of commercial software and nearly 300 functioning microcomputer systems—some dating back to the mid-1980s. Stanford...
Read 0 Comments

Industrial IoT Group Releases Security Framework

The Industrial Internet Consortium (IIC) , which was founded by AT&T, Cisco, GE, IBM, and Intel, released a common framework for security that it hopes will help industrial Internet of Things (IoT) deployments better address securityproblems. Security is critical to industrial IoT because...
Read 0 Comments

Pages

Click Here!