Home Search

for - search results

If you're not happy with the results, please do another search

Reckoning the Spectre and Meltdown Performance Hit for HPC

While no one has yet created an exploit to take advantage of the Spectre and Meltdown speculative execution vulnerabilities that were exposed by Google...

Containers, the GPL, and Copyleft: No Reason for Concern

Though open source is thoroughly mainstream, new software technologies and old technologies that get newly popularized sometimes inspire hand-wringing about open source licenses. Most...

Introducing RLlib: A Composable and Scalable Reinforcement Learning Library

In a previous post, I outlined emerging applications of reinforcement learning (RL) in industry. I began by listing a few challenges facing anyone wanting to apply RL, including...

DevOps and Security: How to Overcome Cultural Challenges and Transform to True DevSecOps

Similar to the proliferation of mobile devices in the enterprise several years ago where organizations were feeling the pressure to have a mobile strategy...

Hands-on Test of Windows Subsystem for Linux

If you don't want to do without the main advantages of Linux on the Windows platform, the Windows Subsystem for Linux offers another option....

Security with the Trusted Platform Module

The Trusted Platform Module on your computer's motherboard could lead to better security for your Linux system. The security of any operating system (OS) layer...

Tips for Automating Distributed Logging on Production Kubernetes

Any Kubernetes production environment will rely heavily on logs. Using built-in Kubernetes capabilities along with some additional data collection tools, you can easily automate log collection...

JavaScript Trends for 2018

Trying to bet on how many new JavaScript frameworks will be released each month, is, the best software engineer’s game in the past 5...

The 5 Best Linux Distributions for Development

When considering Linux, there are so many variables to take into account. What package manager do you wish to use? Do you prefer a...

4 Tools for Network Snooping on Linux

Computer networking data has to be exposed, because packets can't travel blindfolded, so join us as we use whois, dig, nmcli, and nmap to...