News Category: Enterprise

New Strain of Linux Malware Could Get Serious

A new strain of malware targeting Linux systems, dubbed "Linux/Shishiga," could morph into a dangerous security threat. Eset on Tuesday disclosed the threat, which represents a new Lua family unrelated to previously seen LuaBot malware. Linux/Shishiga uses four different protocols -- SSH, Telnet,...
Read 0 Comments

Compose your Infrastructure, Don’t Micromanage It

TLDR: Leverage Kubernetes annotations across your cluster to declaratively configure management of monitoring and logging. Two of the largest surfaces of applications that make contact with infrastructure are monitoring and logging, and this post talks how to approach both these needs in a scalable...
Read 0 Comments

What's a Service Mesh? And Why Do I Need One?

tl;dr: A service mesh is a dedicated infrastructure layer for making service-to-service communication safe, fast, and reliable. If you’re building a cloud native application, you need a service mesh! Over the past year, the service mesh has emerged as a critical component of the cloud native stack...
Read 0 Comments

How to Get Started Learning to Program

There's a lot of buzz lately about learning to program. Not only is there a shortage of people compared with the open and pending positions in software development, programming is also a career with one of the highest salaries and highest job satisfaction rates. No wonder so many people are looking...
Read 0 Comments

workstation-security.jpg

Backup and storage
Safe and reliable backups are a must for all system administrators. Here are some guidelines to consider for your own peace of mind.

How to Safely and Securely Back Up Your Linux Workstation

Even seasoned system administrators can overlook Linux workstation backups or do them in a haphazard, unsafe manner. At a minimum, you should set up encrypted workstation backups to external storage. But it’s also nice to use zero-knowledge backup tools for off-site/cloud backups for more peace...
Read 0 Comments

Release Update: Prometheus 1.6.1 and Sneak Peak at 2.0

After 1.5.0 earlier in the year, Prometheus 1.6.1 is now out. There’s a plethora of changes, so let’s dive in. The biggest change is to how memory is managed. The -storage.local.memory-chunks and -storage.local.max-chunks-to-persist flags have been replaced by -storage.local.target-heap-size. ...
Read 0 Comments

Google Zero-Trust Security Framework Goes Beyond Passwords

With a sprawling workforce, a wide range of devices running on multiple platforms, and a growing reliance on cloud infrastructure and applications, the idea of the corporate network as the castle and security defenses as walls and moats protecting the perimeter doesn’t really work anymore. Which is...
Read 0 Comments

OpenStack for Research Computing

In this video from Switzerland HPC Conference, Stig Telfer from StackHPC presents: OpenStack for Research Computing. OpenStack is a cloud operating system that controls large pools of compute, storage, and networking resources throughout a datacenter, all managed through a dashboard that gives...
Read 0 Comments

NASA’s 10 Coding Rules for Writing Safety Critical Program

The large and complex software projects use some sort of coding standards and guidelines. These guidelines establish the ground rules that are to be followed while writing software.a) How the code should be structured?b) Which language feature should or should not be used? In order to be effective...
Read 0 Comments

On Multi-Cloud Tradeoffs and the Paradox of Openness

In any technology adoption decision organisations are faced with a balancing act between openness and convenience. Open standards and open source, while in theory driving commoditization and lower cost, also create associated management overheads. Choice comes at a cost. Managing heterogeneous...
Read 0 Comments

Pages

Click Here!