Home Search
environment - search results
If you're not happy with the results, please do another search
Are Women in Tech Facing Extinction?
We hear a lot about how few women work in tech. The numbers range from 3 percent in open source to 25 percent industry-wide. But frankly, those...
The Basics of Going Serverless with Node.js
Developers are continuing to look for more efficient and effective ways to build out applications, and one of the new approaches to this involves...
Become a Certified Kubernetes Admin with the Cloud Native Computing Foundation
The ever-increasing push to the cloud demands proven skills in areas such as cloud migration, application integration, automation, and more. The recent Open Source...
Optimizing Web Servers for High Throughput and Low Latency
This is an expanded version of my talk at NginxConf 2017 on September 6, 2017. As an SRE on the Dropbox Traffic Team, I’m...
How Open Source Contributes to Microsoft’s Cloud Strategy
This article was sponsored by Microsoft and written by Linux.com.
Julia Liuson, Corporate Vice President of Developer Tools & Services at Microsoft, says Microsoft’s support...
Future Proof Your SysAdmin Career: Getting Certified
In today’s rapidly changing system administration landscape, skills and credentials count for a lot, but professional certification can also make a difference. With that...
Linux Distros That Serve Scientific and Medical Communities
Linux serves — of that there is no doubt — literally and figuratively. The open source platform serves up websites across the globe, it...
Time-Series-Based Monitoring with Prometheus
Wherever container-based microservices spread, classic monitoring tools such as Nagios and Icinga quickly reach their limits. They are simply not designed to monitor short-lived objects such...
Future Proof Your SysAdmin Career: Embracing DevOps
Sysadmins are increasingly looking to expand their skillsets and carve out new opportunities. With that in mind, many sysadmins are looking to the world...
Security Concerns Engulfing IoT Applications, and What Vendors Are Doing About It
Unlike servers or networking equipment, which are typically hacked through isolated access points and exist in sandboxed and supervised environments, IoT devices are more...





