Home Search

applications - search results

If you're not happy with the results, please do another search

How to Change Your Linux Console Fonts

I try to be a peaceful soul, but some things make that difficult, like tiny console fonts. Mark my words, friends, someday your eyes...

Today’s CPU Vulnerability: What You Need to Know

Last year, Google’s Project Zero team discovered serious security flaws caused by “speculative execution,” a technique used by most modern processors (CPUs) to optimize performance. The Project...

10 Open Source Technologies You’ll Need to Know in 2018

For most enterprise IT departments, using and contributing to open source projects is now a part of everyday life. In Black Duck's 2017 Open Source 360°...

​Major Linux Redesign in the Works to Deal with Intel Security Flaw

A serious security memory problem in all Intel chips has led to Linux's developers resetting how to deal with memory. The result will be...

Tips and Resources for Learning Kubernetes

Regardless of how you decide to begin, it's time to start learning Kubernetes. If you read Kubernetes' description—"an open source system for automating deployment, scaling, and...

Unraveling the MEC Standards Puzzle

Multi-access Edge Computing (MEC) is quickly gaining traction as a disruptive technology that promises to bring applications and content closer to the network edge....

Container Basics: Terms You Need to Know

In the previous article, we talked about what containers are and how they breed innovation and help companies move faster. And, in the following...

The Sweetness of JAMstack: JavaScript, APIs and Markup

The JAMstack approach to web development has been emerging for several years, but really took off in 2017. More a design philosophy than an...

Unit Testing: Time-Consuming but Product-Saving

“Today i finally recognized that unit tests are a critical part of my programming flow” — Ashley Williams, Twitter. Long-time Node.js advocate Ashley Williams kicked off her...

8 Takeaways from NIST’s Application Container Security Guide

Companies are leveraging containers on a massive scale to rapidly package and deliver software applications. But because it is difficult for organizations to see...