Home Search

install - search results

If you're not happy with the results, please do another search

Essential Developer Guide for Building Blockchain Applications Using Hyperledger Sawtooth

Hyperledger Sawtooth is an enterprise blockchain platform for building distributed ledger applications and networks. The design philosophy targets keeping ledgers distributed and making smart contracts safe, particularly...

Google Announces Spinnaker For Google Cloud Platform

Google has announced Spinnaker for Google Cloud Platform, a service that brings the popular continuous delivery (CD) solution to its users. By bringing Spinnaker to GCP, Google...

Running Blockchain Applications in Hyperledger Explorer

Hyperledger Explorer is a powerful utility that allows users to create user-friendly web-based applications. It is a blockchain dashboard and provides the ability to...

Aqua Security Launches Microsoft Azure Marketplace Private Offers

Aqua Security has announced a new Private Offer for software licensing and procurement directly through Microsoft Azure Marketplace. Software purchased directly from Aqua can...

Essential Hyperledger Composer tools and administrative, operational, and development commands

Hyperledger tools are very popular for building blockchain and decentralized applications. In particular, Hyperledger Fabric and Hyperledger Composer are the most widely used tools....

Kubernetes 1.15 Released

The Kubernetes community has announced the release of Kubernetes 1.15, the second release of 2019. The release focuses on Continuous Improvement and Extensibility. Work...

Linux Server Hardening Using Idempotency with Ansible: Part 3

In the previous articles, we introduced idempotency as a way to approach your server’s security posture and looked at some specific Ansible examples, including...

Linux Server Hardening Using Idempotency with Ansible: Part 2

In the first part of this series, we introduced something called idempotency, which can provide the ongoing improvements to your server estate’s security posture....

Linux Server Hardening Using Idempotency with Ansible: Part 1

I think it’s safe to say that the need to frequently update the packages on our machines has been firmly drilled into us. To...

How to Authenticate a Linux Desktop to Your OpenLDAP Server

In this final part of our three-part series, we reach the conclusion everyone has been waiting for. The ultimate goal of using LDAP (in...