News Category: Enterprise

New IEEE Position Statement Supports Strong Encryption

On 24 June, the IEEE Board of Directors adopted a position statement in support of strong encryption for confidentiality and data integrity.  The essence of the position is that: “IEEE supports the use of unfettered strong encryption to protect confidentiality and integrity of data and...
Read 0 Comments

Wi-Fi Security Is Starting to Get its Biggest Upgrade in Over a Decade

Wi-Fi devices have been using the same security protocol for over a decade. But today, that’ll begin to change: the Wi-Fi Alliance, which oversees adoption of the Wi-Fi standard, is beginning to certify products that support WPA3, the successor to the WPA2 security protocol that’s been in use since...
Read 0 Comments

Netdev Day 1: IPsec!

Today at the conference I learned a lot about IPsec, so we’re going to talk about IPsec! There was an IPsec workshop given by Sowmini Varadhan and Paul Wouters. All of the mistakes in this post are 100% my fault though :). what’s IPsec? IPsec is a protocol used to encrypt IP packets. Some VPNs are...
Read 0 Comments

A SysAdmin's Guide to SELinux: 42 Answers to the Big Questions

"It is an important and popular fact that things are not always what they seem…" ―Douglas Adams, The Hitchhiker's Guide to the Galaxy Security. Hardening. Compliance. Policy. The Four Horsemen of the SysAdmin Apocalypse. In addition to our daily tasks—monitoring, backup, implementation, tuning,...
Read 0 Comments

Becoming a Senior Developer: 9 Experiences You'll Encounter

Many programming career guidelines stress the skills a software developer is expected to acquire. Such general advice suggests that someone who wants to focus on a technical track—as opposed to, say, taking a management path to CIO—should go after the skills needed to mentor junior developers,...
Read 0 Comments

​The Return of Spectre

The return of Spectre sounds like the next James Bond movie, but it's really the discovery of two new Spectre-style CPU attacks. Vladimir Kiriansky, a Ph.D. candidate at MIT, and independent researcher Carl Waldspurger found the latest two security holes. They have since published a MIT paper, ...
Read 0 Comments

Container Adoption Starts to Outpace DevOps

The survey of 601 IT decision-makers conducted by ClearPath Strategies on behalf of the Cloud Foundry Foundation (CFF) finds that 32 percent of respondents have adopted containers and are employing DevOps processes. But the number of respondents who plan to adopt or evaluate containers in the next...
Read 0 Comments

A SysAdmin's Guide to Network Management

If you're a sysadmin, your daily tasks include managing servers and the data center's network. The following Linux utilities and commands—from basic to advanced—will help make network management easier. In several of these commands, you'll see <fqdn>, which stands for "fully qualified domain...
Read 0 Comments

Continuous Integration and Delivery Tool Basics

CI/CD tools are key to today's agile, container-driven software production cycle. This "explain like I'm 5" overview helps you get started. Once upon a time, back when waterfall was the primary software development methodology, you could spend months or years working on a single software project....
Read 0 Comments

Docker Guide: Dockerizing Python Django Application

Docker is an open-source project that provides an open platform for developers and sysadmins to build, package, and run applications anywhere as a lightweight container. Docker automates the deployment of applications inside software containers. Django is a web application framework written in...
Read 0 Comments

Pages

Click Here!