News Category: Enterprise

Comparing Files and Directories with the diff and comm Linux Commands

There are a number of ways to compare files and directories on Linux systems. The diff, colordiff, and wdiff commands are just a sampling of commands that you're likely to run into. Another is comm. The command (think "common") lets you compare files in side-by-side columns the contents of...
Read 0 Comments

DevSecOps Gains Enterprise Traction

Enterprise adoption of DevSecOps has surged in the past year, according to a study conducted at this year's RSA Conference. DevSecOps is a great portmanteau word, but is it a concept in wide use? According to a survey of attendees at this year's RSA Conference, it's not yet universal, but many more...
Read 0 Comments

Designing New Cloud Architectures: Exploring CI/CD – from Data Centre to Cloud

Today, most companies are using continuous integration and delivery (CI/CD) in one form or another – and this is of significance due to various reasons: It increases the quality of the code base and the testing of that code base It greatly increases team collaboration It reduces the time in which...
Read 0 Comments

How Not to Kill your DevOps Team

A thriving DevOps culture should mean a thriving IT team, one that plays a critical role in achieving the company’s goals. But leave certain needs and warning signs unchecked and your DevOps initiative might just grind your team into the ground. There are things that IT leaders can do to foster a...
Read 0 Comments

Kubernetes Deep Dive and Use Cases

The popularity of Kubernetes has steadily increased, with more than four major releases in 2017. K8s also was the most discussed project in GitHub during 2017, and was the project with the second most reviews. Deploying Kubernetes Kubernetes offers a new way to deploy applications using containers...
Read 0 Comments

10 Open Source Security Tools You Should Know

Open source tools can be the basis for solid security and intense learning. Here are 10 you should know about for your IT security toolkit. In many ways, security starts with understanding the situation. For a couple of generations of IT security professionals, understanding their networks'...
Read 0 Comments

Open-Source Security: Zip Slip Critical Flaw Hits Thousands of Projects. Update Now

Security firm Snyk has disclosed a widespread and critical flaw in multiple archive file-extraction libraries found in thousands of open-source web application projects from HP, Amazon, Apache, Oracle, LinkedIn, Twitter and others. As Snyk explains, some ecosystems, such as Java, don't provide a...
Read 0 Comments

You Don't Know Bash: An Introduction to Bash Arrays

Although software engineers regularly use the command line for many aspects of development, arrays are likely one of the more obscure features of the command line (although not as obscure as the regex operator =~). But obscurity and questionable syntax aside, Bash arrays can be very powerful. Wait...
Read 0 Comments

All Things Enterprise Cloud Native at Red Hat

At KubeCon + CloudNativeCon in Copenhagen in early May, we caught up with Red Hat‘s Brandon Philips, to discuss the state of CoreOS and containers as a whole. Philips was previously with CoreOS, which was acquired by Red Hat back in January, and the pairing has focused a good amount of Linux...
Read 0 Comments

The Open Source, Private Cloud Alternatives to Dropbox and Slack

It’s part of a growing trend to replace cent1rally hosted services with those that can be run on servers under an individual or organization’s control in their own legal jurisdictions—and customed to their specific needs. “As a company, we don’t have any servers—we don’t do any hosting,” says...
Read 0 Comments

Pages

Click Here!