Tags: Best Practices

Why You Need Centralized Logging and Event Log Management

More companies are using their security logs to detect malicious incidents. Many of them are collecting too much log data—often billions of events. They brag about the size of their log storage drive arrays. Are they measured in terabytes or petabytes? A mountain of data doesn’t give them as much...
Read 0 Comments

2017: A Year of Highs and Lows for Linux and Open Source

Jack Wallen takes a look into the wayback machine to view some of the highlights open source and Linux enjoyed throughout 2017. Ah, 2017, it was a good year for Linux—one that continued the solidification of the open source platform on so many levels. From the consumer mobile space to...
Read 0 Comments

community.jpg

community
Open source involves a culture of understanding change. It’s about evolution as a group, says Mesosphere’s CMO Peter Guagenti.

Sustainable Open Source Is About Evolution As a Group

In the early days of open source, one of the primary goals of the open source community was educating people about the benefits of open source and why they should use it. Today, open source is ubiquitous. Almost everyone is using it. That has created a unique challenge around educating new users...
Read 0 Comments

Should You Open Source Your Product? That’s the Wrong Question

I often get called in to help companies make decisions about their open source strategy. They want to release key parts of their software as open source, but they need some help figuring out the best way to make it happen. I always ask them the same question: Why? Why are you planning to open any...
Read 0 Comments

Center stage: Best Practices for Staging Environments

Let’s talk about staging. We’re talking about staging because no one talks about it. It’s mentioned in passing as the annoying sidekick to production. It’s the expected and completely necessary part of the deployment cycle barely touched by schools or internships. It’s considered such an obvious...
Read 0 Comments

Changes in Password Best Practices

NIST recently published its four-volume SP800-63-3 Digital Identity Guidelines. Among other things, it makes three important suggestions when it comes to passwords: Stop it with the annoying password complexity rules. They make passwords harder to remember. They increase errors because artificially...
Read 0 Comments

7 Best Practices for Giving a Conference Talk

You want your first speaking experience to be a happy one, so I've prepared tips that may help you when writing and presenting your talk. 1. Know your audience The SeaGL audience, for example, is an interesting mix of those new to tech and folks who have been around technology for a long time....
Read 0 Comments

Review by Many Eyes Does Not Always Prevent Buggy Code

Writing code is hard. Writing secure code is harder—much harder. And before you get there, you need to think about design and architecture. When you're writing code to implement security functionality, it's often based on architectures and designs that have been pored over and examined in detail....
Read 0 Comments

Secure Coding in Java: Bad Online Advice and Confusing APIs

For programmers and software developers, the Internet forums provide a great place to exchange knowledge and seek answers to concrete coding conundrums. Alas, they are not always the source of accurate information. A group of Virginia Tech researchers has analyzed hundreds of posts on Stack...
Read 0 Comments

Why Developer Evangelism Is the Secret to the Success of Kubernetes

Kubernetes is the hottest thing to hit containers since...Docker. That's faint praise, given that Docker barely burst onto the scene in 2013. But, given the pace of enterprise infrastructure innovation these days, four years may be all the limelight one gets. As such, it's critical to make the most...
Read 0 Comments

Pages

Click Here!