News Category: Enterprise

workstation-security-githubpub-linuxcom-hero-2.jpg

Workstation Security Checklist
In this new blog series, we’ll lay out a set of baseline recommendations for Linux workstation security to help systems administrators avoid the most glaring security errors without too much inconvenience.

3 Security Features to Consider When Choosing a Linux Workstation

Learn how to work from anywhere and keep your data, identity, and sanity. DOWNLOAD NOW If your systems administrators are remote workers, you may wish to establish a set of guidelines to help ensure that their workstations pass core security requirements. This will help reduce the risk that they...
Read 1 Comments

The Logical Happens: Open-O Merges with ECOMP

We’ve noted in the past that two Linux Foundation open source projects seemed to be working on similar things: The Open-O project and open source ECOMP. Today, the Linux Foundation announced that the two groups are merging. The new name for the combined group is the Open Network Automation Platform...
Read 0 Comments

10 Most Common Reasons Kubernetes Deployments Fail (Part 1)

I've catalogued the most common reasons Kubernetes Deployments fail, and I'm sharing my troubleshooting playbook with you! Without further ado, here are the 10 most common reasons Kubernetes Deployments fail: 1. Wrong Container Image / Invalid Registry Permissions Two of the most common problems...
Read 0 Comments

Today's Leading Causes of DDoS Attacks

Last fall, we saw the biggest distibuted denial of service (DDoS) attack ever. This year we'll see even bigger ones. According to Akamai's latest State of the Internet Security report, here's what's behind them. First, you should know that while the total DDoS attacks only increased by 4 percent...
Read 0 Comments

eduardo-silva-container-logging.png

Eduardo Silva
Eduardo Silva, a software engineer at Treasure Data, gave a crash course in distributed logging during his keynote at CloudNativeCon last November.

Distributed Logging for Containers

The era of microservices calls for a new approach to logging with built-in infrastructure for both aggregation and storage. Multiple applications running in isolated containers require a specialized approach to make sure all data is collected, stored and usable later. Eduardo Silva, a software...
Read 0 Comments

Evolution of Business Logic from Monoliths through Microservices, to Functions

The whole point of running application software is to deliver business value of some sort. That business value is delivered by creating business logic and operating it so it can provide a service to some users. The time between creating business logic and providing service to users with that logic...
Read 0 Comments

Blockchain: A New Hope, or Just Hype?

Cryptocurrencies such as bitcoin may have captured the public’s fancy – and also engendered a healthy dose of skepticism — but it is their underlying technology that is proving to be of practical benefit to organizations: the blockchain. Many industries are exploring its benefits and testing its...
Read 0 Comments

5 Open Source Security Tools Too Good to Ignore

If you haven’t been looking to open source to help address your security needs, it’s a shame—you’re missing out on a growing number of freely available tools for protecting your networks, hosts, and data. The best part is, many of these tools come from active projects backed by well-known sources...
Read 0 Comments

Why Upstream Contributions Matter when Developing Open Source NFV Solutions

When software is developed using open source methods, an upstream repository of the code is accessible to all members of the project. Members contribute to the code, test it, write documentation and can create a solution from that code to use or distribute under license. If an organization follows...
Read 0 Comments

Apache Kafka: A Primer

Apache Kafka is fast becoming the preferred messaging infrastructure for dealing with contemporary, data-centric workloads such as Internet of Things, gaming, and online advertising. The ability to ingest data at a lightening speed makes it an ideal choice for building complex data processing...
Read 0 Comments

Pages

Click Here!