News Category: Enterprise

Testing Kubernetes RBAC

Securing your Kubernetes cluster is one thing, keeping it secure is a continuous uphill struggle. However, with the introduction of new features to Kubernetes it is becoming much easier to do both. Kubernetes (as of version 1.6) has introduced the concept of Role-Based Access Control (RBAC), allows...
Read 0 Comments

New Security Woes for Popular IoT Protocols

Researchers at Black Hat Europe will detail denial-of-service and other flaws in MQTT, CoAP machine-to-machine communications protocols that imperil industrial and other IoT networks online. Security researcher Federico Maggi had been collecting data – some of it sensitive in nature – from hundreds...
Read 0 Comments

blue-cloud-1920.jpg

cloud survey
We're surveying FOSS developers and users about 6 top cloud solution and service providers that deploy open source software; complete the survey and enter to win a maker kit.

Take Our Cloud Providers Survey and Enter to Win a Maker Kit

Today’s most dynamic and innovative FOSS projects boast significant  involvement by well-known cloud service and solution providers. We are launching a survey to better understand the perception of these solution providers by people engaging in open source communities. Visible participation and...
Read 0 Comments

A Pioneering Scientist Explains Deep Learning

Buzzwords like “deep learning” and “neural networks” are everywhere, but so much of the popular understanding is misguided, says Terrence Sejnowski, a computational neuroscientist at the Salk Institute for Biological Studies. Sejnowski, a pioneer in the study of learning algorithms, is the author...
Read 0 Comments

Carnegie Mellon is Saving Old Software from Oblivion

A prototype archiving system called Olive lets vintage code run on today’s computers. Researchers’ growing dependence on computers and the difficulty they encounter when attempting to run old software are hampering their ability to check published results. The problem of obsolescent software is...
Read 0 Comments

4-Phase Approach for Taking Over Large, Messy IT Systems

Everyone loves building shiny, new systems using the latest technologies and especially the most modern DevOps tools. But that's not the reality for lots of operations teams, especially those running larger systems with millions of users and old, complex infrastructure. It's even worse for teams...
Read 0 Comments

5 Things Your Team Should Do to Make Pull Requests Less Painful

In this article we’ll go over some best practices that help ensure good pull requests. Writing good pull requests and having an effective workflow will increase a team’s productivity and minimize frustration. Although a pull request is traditionally considered the final point in the developer...
Read 0 Comments

The Illustrated TLS Connection

Every byte of a TLS connection explained and reproduced. In this demonstration, a client has connection to a server, negotiated a TLS 1.2 session, sent "ping", received "pong", and then terminated the session. Click below to begin exploring. Client Hello   The session begins with the client...
Read 0 Comments

Around 62 Percent of All Internet Sites Will Run an Unsupported PHP Version in 10 Weeks

The highly popular PHP 5.x branch will stop receiving security updates at the end of the year. According to statistics from W3Techs, roughly 78.9 percent of all Internet sites today run on PHP.  But on December 31, 2018, security support for PHP 5.6.x will officially cease, marking the end of all...
Read 0 Comments

Best Design Practices to Get the Most out of Your API

Practical techniques to ensure developers can actually do the things you want them to do using your API. In the previous chapters, we gave an overview of various approaches for transmitting data via your web API. Now that you're familiar with the landscape of transport and have an understanding of...
Read 0 Comments

Pages

Click Here!