Home Search
environment - search results
If you're not happy with the results, please do another search
Pros and Cons of System Update and Integrity Protection Schemes
Given the increasing malware attacks against Linux-based IoT devices, there is growing interest in integrity protection schemes, as well as system update mechanisms that...
Release Update: Prometheus 1.6.1 and Sneak Peak at 2.0
After 1.5.0 earlier in the year, Prometheus 1.6.1 is now out. There’s a plethora of changes, so let’s dive in.
The biggest change is to how memory is managed....
Martin Casado at ONS: Making SDN Real
Software Defined Networking (SDN) has evolved significantly since the concept began to be considered in the 1990s, and Martin Casado, General Partner, Andreessen Horowitz,...
Your CEO’s Obliviousness about Open Source is Endangering Your Business
By Jeff Luszcz, Vice President of Product Management at Flexera Software
The consequences are easily recognizable; you remember the lucrative software product whose vendor was compelled...
The Companies That Support Linux and Open Source: Doky
Doky is a Linux-based online operating system that provides cloud collaboration and storage and a quickly growing, fully integrated set of virtual desktop apps....
The Architecture of the Web Is Unsafe for Today’s World
Twenty-eight years ago, British computer scientist Tim Berners-Lee proposed a system to link text documents across a computer network. It changed the way the...
Why the Command-and-Control Mindset Is Killing Your Company
The world has reached a key moment in the history of the way we work. We have entered a new business environment, dictated by...
What Makes Up a Kubernetes Cluster?
In our first three installments in this series, we learned what Kubernetes is, why it's a good choice for your datacenter, and how it...
Un-Masking FD.io – the Open Source Project that Processes Packets
The Fast Data Project (FD.io) is a networking open source project whose scope includes software-based packet processing, fast Input/Output (IO), and universal data plane management across bare metal,...
Why You Shouldn’t Use ENV Variables for Secret Data
The twelve-factor app manifesto recommends that you pass application configs as ENV variables. However, if your application requires a password, SSH private key, TLS Certificate, or...