News Category: Enterprise

7 Tips to Declutter Your Work Life

Could decluttering your work life make you more productive and happy in 2019? Considering the fact that millions of people have bought into Marie Kondo's organization method, as described in her book “The Life-Changing Magic of Tidying Up,” and in her popular new Netfilx series, it's an idea worth...
Read 0 Comments

Back to Basics: Sort and Uniq

Learn the fundamentals of sorting and de-duplicating text on the command line. If you've been using the command line for a long time, it's easy to take the commands you use every day for granted. But, if you're new to the Linux command line, there are several commands that make your life easier...
Read 0 Comments

Faucet: An Open Source SDN Controller for High-Speed Production Networks

Open standards such as OpenFlow and P4 promised to improve the landscape by opening access to these devices via a programmable API, but they still require someone to write a controller to re-implement normal switch functionality, such as forwarding and routing, in a multi-vendor, standards-...
Read 0 Comments

Ansible vs. Puppet: Declarative DevOps Tools Square Off

DevOps aims to drive collaboration between development and operations teams, but software quality drives DevOps adoption more than any other factor. As this comparison of Ansible vs. Puppet shows, software quality dramatically influences DevOps tools. Software quality tends to be an organizational...
Read 0 Comments

An Introduction to the Machine Learning Platform as a Service

Machine-Learning-Platform-as-a-Service (ML PaaS) is one of the fastest growing services in the public cloud. It delivers efficient lifecycle management of machine learning models. At a high level, there are three phases involved in training and deploying a machine learning model. These phases...
Read 0 Comments

(Don't) Return to Sender: How to Protect Yourself From Email Tracking

There are a lot of different ways to track email, and different techniques can lie anywhere on the spectrum from marginally acceptable to atrocious. Responsible tracking should aggregate a minimal amount of anonymous data, similar to page hits: enough to let the sender get a sense of how well their...
Read 0 Comments

How ASLR Protects Linux Systems from Buffer Overflow Attacks

Address Space Layout Randomization (ASLR) is a memory-protection process for operating systems that guards against buffer-overflow attacks. It helps to ensure that the memory addresses associated with running processes on systems are not predictable, thus flaws or vulnerabilities associated with...
Read 0 Comments

5 Open Source Tools to Upgrade your Next Kubernetes Project

Kubernetes is one of the most popular technologies around today. So, it’s no surprise that there are an awful lot of open source libraries, tools, and other assorted goodies out there on GitHub. We like to keep an eye on what’s fresh for developers, so today we’re taking a look at five different...
Read 0 Comments

New Linux Systemd Security Holes Uncovered

Many Linux sysadmins and users dislike Systemd, but love it or hate it, the Systemd is the default system and service manager for most Linux distributions. So, security company Qualys's recent revelation of three new Systemd security vulnerabilities isn't going to win Systemd any friends. How bad...
Read 0 Comments

5 Trends Transforming Digital and IT Operations Management

Heading into 2019, digitalization will accelerate business model innovation and drive the adoption of these emerging technologies for sustainable competitive advantage. Here’s a closer look at five technology trends that will change the way enterprises approach digital operations management in 2019...
Read 0 Comments

Pages

Click Here!