News Category: Enterprise

11 Ways (Not) to Get Hacked

Kubernetes security has come a long way since the project's inception, but still contains some gotchas. Starting with the control plane, building up through workload and network security, and finishing with a projection into the future of security, here is a list of handy tips to help harden your...
Read 0 Comments

Google: Security Keys Neutralized Employee Phishing

Google has not had any of its 85,000+ employees successfully phished on their work-related accounts since early 2017, when it began requiring all employees to use physical Security Keys in place of passwords and one-time codes, the company told KrebsOnSecurity.   Security Keys are inexpensive USB-...
Read 0 Comments

IO500 List Showcases World’s Fastest Storage Systems for HPC

In this video from ISC 2018, John Bent and Jay Lofstead describe how the IO500 benchmark measures storage performance in HPC environments. The second IO500 list was revealed at ISC 2018 in Frankfurt, Germany. Following the success of the Top500 in collecting and analyzing historical trends in...
Read 0 Comments

Brian Kernighan Remembers the Origins of ‘grep’

This month saw the release of a fascinating oral history, in which 76-year-old  Brian Kernighan remembers the origins of the Unix command grep. Kernighan is already a legend in the world of Unix — recognized as the man who coined the term Unix back in 1970. His last initial also became the “k” in ...
Read 1 Comments

Do You Need a Service Mesh?

Beyond the hype, it’s necessary to understand what a service mesh is and what concrete problems it solves so you can decide whether you might need one. A brief introduction to the service mesh The service mesh is a dedicated infrastructure layer for handling service-to-service communication in...
Read 0 Comments

Persistent Volumes for Docker Containers

Docker guarantees the same environment on all target systems: If the Docker container runs for the author, it also runs for the user and can even be preconfigured accordingly. Although Docker containers seem like a better alternative to the package management of current distributions (i.e., RPM and...
Read 0 Comments

Building Containers with HPC Container Maker

Containers package entire workflows, including software, libraries, and even data, into a single file. The container can then be run on any compatible hardware that can run the container type, regardless of the underlying operating system. Containers are finding increased utility in the worlds of...
Read 0 Comments

How to Give IT Project Estimates—And When Not to Estimate at All

Everyone wants to know how long a project will take. Here’s how to provide managers with a prediction that’s both accurate and imprecise, using cycle time and counting stories, along with advice on when to avoid estimation altogether. Estimation is work, too. Many teams account for estimation in...
Read 0 Comments

Deep Learning and Artificial Intelligence

Artificial intelligence (AI) is in the midst of an undeniable surge in popularity, and enterprises are becoming particularly interested in a form of AI known as deep learning. According to Gartner, AI will likely generate $1.2 trillion in business value for enterprises in 2018, 70 percent more than...
Read 0 Comments

10 Key Attributes of Cloud-Native Applications

Cloud native is a term used to describe container-based environments. Cloud-native technologies are used to develop applications built with services packaged in containers, deployed as microservices and managed on elastic infrastructure through agile DevOps processes and continuous delivery...
Read 0 Comments

Pages

Click Here!