News Category: Enterprise

7 Ways to Automate Kubernetes at Scale in Production

The Kubernetes open source container orchestration engine is not a management platform, nor should it be mistaken for one. The whole point of orchestration is to reliably enable an automated system to facilitate the deployment and management of applications at scale, without the need for human...
Read 0 Comments

A Step-by-Step Guide to Git

If you've never used Git, you may be nervous about it. There's nothing to worry about—just follow along with this step-by-step getting-started guide, and you will soon have a new Git repository hosted on GitHub. Before we dive in, let's clear up a common misconception: Git isn't the same thing as...
Read 0 Comments

The Effects of the Spectre and Meltdown Vulnerabilities

Spectre and Meltdown aren't anomalies. They represent a new area to look for vulnerabilities and a new avenue of attack. They're the future of security­ -- and it doesn't look good for the defenders. Modern computers do lots of things at the same time. Your computer and your phone simultaneously...
Read 0 Comments

Employers Want JavaScript, but Developers Want Python

When it comes to which programming languages are in demand by employers, JavaScript, Java, Python, C++, and C—in that order—came out on top in a recent developer survey. Developers, however, want to learn languages like Python, Go, and Kotlin. A survey of developers by technical recruiter...
Read 0 Comments

Introducing RLlib: A Composable and Scalable Reinforcement Learning Library

In a previous post, I outlined emerging applications of reinforcement learning (RL) in industry. I began by listing a few challenges facing anyone wanting to apply RL, including the need for large amounts of data, and the difficulty of reproducing research results and deriving the error estimates...
Read 0 Comments

How We Built an Intrusion Detection System on AWS using Open Source Tools

It’s roughly a year now that we built an intrusion detection system on AWS cloud infrastructure that provides security intelligence across some selected instances using open source technologies. As more instances were spun, real-time security monitoring became necessary. We wanted the capability to...
Read 0 Comments

DevOps and Security: How to Overcome Cultural Challenges and Transform to True DevSecOps

Similar to the proliferation of mobile devices in the enterprise several years ago where organizations were feeling the pressure to have a mobile strategy but didn’t know where to start, we’re seeing the same situation with development methodologies. To accelerate development velocity, teams are...
Read 0 Comments

8 Unusual IT Interview Questions and Approaches: CIOs Share

We asked IT and business leaders to share their tips for bringing out these and other key  qualities during interviews. Read on for their unique and interesting interview questions and strategies – and what the responses help them discern about candidates. And if you’re a job seeker: Learn and get...
Read 0 Comments

Hands-on Test of Windows Subsystem for Linux

If you don't want to do without the main advantages of Linux on the Windows platform, the Windows Subsystem for Linux offers another option. We delve the depths of the Linux underworld and explain how you can optimize the subsystem. The new Linux subsystem [1] has been around since the Windows 10...
Read 0 Comments

Announcing the Availability of Kubernetes 1.9.1 Certified Kubernetes Administrator (CKA) Exam

This third release of the CKA exam demonstrates CNCF’s ongoing commitment to grow the Kubernetes ecosystem by ensuring that developers and operations can demonstrate their skills with the latest version of Kubernetes. The latest CKA exam maps to the latest Kubernetes 1.9.1 release published last...
Read 0 Comments

Pages

Click Here!