Home Search

applications - search results

If you're not happy with the results, please do another search

Best Practices for 2-Factor Authentication and Password Creation on Linux

As we mentioned in the previous article, web browsers present the largest and the most exposed attack surface on your Linux workstation. We’ve already...

Virtualization: The Smart-Connected Vehicle Enabler

The automotive electronic industry is now, more than ever, facing cybersecurity, connectivity, and software time-to-market challenges. Recently, in fact, vehicles have been hacked in...

CNCF Hosts Container Networking Interface (CNI)

Today, the Cloud Native Computing Foundation (CNCF) Technical Oversight Committee (TOC) voted to accept CNI (Container Networking Interface) as the 10th hosted project alongside...

Web Developer Security Checklist

Developing secure, robust web applications in the cloud is hard, very hard. If you think it is easy, you are either a higher form of...

10 JavaScript Concepts Every Node.js Programmer Must Master

With JavaScript and the V8 engine at the core, an event-driven architecture, and scalability out of the box, Node.js has quickly become the new...

Using Docker in Production

Right now, Docker is an excellent tool to manage distributed applications. This is the result of quite a bit of evolution; in its earlier...

Product Development in the Age of Cloud Native

In a cloud native world, where workloads and infrastructure are all geared towards applications that spend their entire life cycle in a cloud environemnt,...

3 Benefits You Didn’t Expect from Linux Containers

Linux containers are gaining significant ground in the enterprise, which is not surprising, since they make so much sense in today’s business environment. With...

IBM’s OpenWhisk Stirs up Serverless IoT with Watson

With the Internet of Things, the realms of embedded Linux and enterprise computing are increasingly intertwined, and serverless computing is the latest enterprise development...

Creating Virtual Machines in KVM: Part 1

So, you want to stuff your Linux laptop or PC full of virtual machines and perform all manner of mad experiments. And so you...