From Measurement to Insight: Put DevOps Metrics to Work

When you can measure the results of your DevOps program, that's where the magic happens. I recently sat down with Dr. Nicole Forsgren, CEO and Chief Scientist at DORA and co-author of the book “Accelerate.” Together we discussed the importance of DevOps and Agile, metrics that matter to the...
Read 0 Comments


The key to open source compliance is knowing what’s in your code, right down to the exact versions of the components, says Ibrahim Haddad.

Good Compliance Practices Are Good Engineering Practices

Ibrahim Haddad: It is true that open source software has to a large extent simplified the process of software procurement. The traditional procurement model for proprietary software has always been heavy on the front end, as it involves trial and evaluation, negotiation related to possible...
Read 0 Comments

Alphabet's Outline Software Lets Anyone Run a Homebrew VPN

A VIRTUAL PRIVATE network, that core privacy tool that encrypts your internet traffic and bounces it through a faraway server, has always presented a paradox: Sure, it helps you hide from some forms of surveillance, like your internet service provider's snooping and eavesdroppers on your local...
Read 0 Comments

Kubernetes: The “Distributed” Linux of the Cloud

Kubernetes is the first CNCF project to graduate — this means it is “mature and resilient enough to manage containers at scale across any industry in companies of all sizes.” We talked with Chris Aniszczyk, COO of CNCF about Kubernetes’ popularity, what’s next for this technology and what other...
Read 0 Comments

Developers Are Ethical But Not Responsible?

Ask a person if he or she is a racist and the answer is almost always no. Ask a developer if they consider ethical considerations when writing code and only six percent say no. If everyone acted the way they self-report, then there would be peace and love throughout the world. Based on over a...
Read 0 Comments

7 Questions to Ask About Your DevSecOps Program

If you’ve implemented, or are implementing, a DevSecOps program, we’ve come up with several questions to consider below. By posing these questions, we hope to help spur new ideas and help identify areas for improvement.  Is My Application (or Microservice) Leaking Data? While microservices have...
Read 0 Comments

Reviewing Logins on Linux

The last command provides an easy way to review recent logins on a Linux system. It also has some useful options –- such as looking for logins for one particular user or looking for logins in an older wtmp file. The last command with no arguments will easily show you all recent logins. It pulls the...
Read 0 Comments

How to Use Ansible to Set Up System Monitoring with Prometheus

In summer 2017, I wrote two how-to articles about using Ansible. After the first article, I planned to show examples of the copy, systemd, service, apt, yum, virt, and usermodules. But I decided to tighten the scope of the second part to focus on using the yum and user modules. I explained how to...
Read 0 Comments

How to Set Up Two-Factor Authentication in Linux

If you're a Linux administrator and looking to lock down your Linux servers and desktops as tight as possible, you owe it to yourself to make use of two-factor authentication. This should be considered as "no-brainer" as they come. Why? Because by adding two-factor authentication, it becomes...
Read 0 Comments

MPLS Explained

Multi-protocol label switching is a way to insure reliable connections for real-time applications, but it's expensive, leading enterprises to consider SD-WAN as a way to limit its use. The thing about MPLS is that it’s a technique, not a service — so it can deliver anything from IP VPNs to metro...
Read 0 Comments


Click Here!