News Category: Enterprise

sysadmin-security-tips.jpg

Security tips
Linux installation best practices for workstation security vary by distribution. But, in general, there are some essential steps to take. Some are pretty obvious (i.e., choose good passphrases), while others are more involved.

Security Tips for Installing Linux on Your SysAdmin Workstation

Once you’ve chosen a Linux distro that meets all the security guidelines set out in our last article, you’ll need to install the distro on your workstation. Linux installation security best practices vary, depending on the distribution. But, in general, there are some essential steps to take: ...
Read 0 Comments

Enterprise Container DevOps Steps Up its Game with Kubernetes 1.6

Managing containers isn't easy. That's where such programs as Docker swarm mode, Kubernetes, and Mesosphere can make or break your containers initiatives. Perhaps the most popular of these, Kubernetes, has a new release, Kubernetes 1.6, that expands its reach by 50 percent to 5,000 node clusters....
Read 0 Comments

How to Learn Unix/Linux

Every month or two, someone asks me how they should go about learning Unix. The short answer is always "use it" or maybe as much as "use it -- a lot." But the detailed answer includes a lot of steps and a good amount of commitment to spending time working on the command line. I may have learned...
Read 0 Comments

Chain of Command Example

The idea is that a cache is often first because it's so fast. We can, of course, write a giant master function with other functions.. One objective of the chain of command design pattern is to be able to write a bunch of functions that link together and form a chain of alternative implementations....
Read 0 Comments

Cloud Foundry Launches Its Developer Certification Program

Cloud Foundry, a massive open source project that allows enterprises to host their own platform-as-a-service for running cloud applications in their own data center or in a public cloud, today announced the launch of its “Cloud Foundry Certified Developer” program. The Cloud Foundry Foundation...
Read 0 Comments

Security Orchestration and Incident Response

Last month at the RSA Conference, I saw a lot of companies selling security incident response automation. Their promise was to replace people with computers ­-- sometimes with the addition of machine learning or other artificial intelligence techniques ­-- and to respond to attacks at computer...
Read 0 Comments

Containerization Leaders Explore Possible Standardized Data Storage Interface

A group of engineers from every leading container orchestrator maker have gathered together, virtually, around an initiative to explore a common lexicon for container-based data storage. Initially proposed by Mesosphere’s Benjamin Hindman, the Container Storage Interface initiative — which, for now...
Read 0 Comments

The Zephyr Project: An RTOS for IoT

How do you develop and sustain an operating system primed for the continuously evolving nature of the internet of things? You model it, in part, on the highly successful Linux platform, which is exactly the tactic of the Zephyr Project, an open, real-time operating system overseen by the nonprofit...
Read 0 Comments

Becoming an Agile Leader, Part 5: Learning to Learn

To summarize: your Agile transformation is stuck. You’ve thought about your why, as in Becoming an Agile Leader, Part 1: Define Your Why. You’ve started to measure possibilities. You have an idea of who you might talk with as in Becoming an Agile Leader, Part 2: Who to Approach. You’ve considered ...
Read 0 Comments

OpenSDS at CloudNativeCon + KubeCon: Moving Forward with SDS and Cloud Computing

CloudNativeCon + KubeCon Europe 2017 has begun and is bringing together the world’s top experts in open source cloud computing. Their goal is to maintain and promote the development of integrated open source technologies to better deploy and implement cloud computing. OpenSDS, a Silver sponsor of...
Read 0 Comments

Pages

Click Here!