Remove page j
article thumbnail

Technology Short Take 158

Scott Lowe

See this page for instructions on how to enable BBR on Debian 10. Operating Systems/Applications. Jorge Castro tears into the “wasting disk space” argument against the Flatpak application package format. For your fix of storage-related links, J Metz has relatively recently published Storage Short Take #47.

Linux 90
article thumbnail

3 tough decisions for IT leaders to achieve a successful digital transformation

CIO Business Intelligence

Reducing technical debt Lowering technical debt by decommissioning legacy applications ranks among the most important and toughest aspects of digital transformation as it involves mindset changes. Jitendra Singh, CIO of J K Cement, encountered resistance when he decided to digitize the entire procurement-to-pay process.

CTO Hire 116
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Technology Short Take 153

Scott Lowe

Here’s a set of 15 principles for designing and deploying scalable applications on Kubernetes. Operating Systems/Applications. Note that this page doesn’t seem to render properly in Firefox, although Chrome and Safari seem fine.). Nothing here this time around—maybe go check J Metz' blog instead ?

Linux 74
article thumbnail

Ciao Milano! – An AWS Region is coming to Italy!

All Things Distributed

The Lamborghini website was being hosted on outdated infrastructure when the company decided to boost their online presence to coincide with the launch of their Aventador J sports car. The website went online in less than one month and was able to support a 250 percent increase in traffic around the launch of the Aventador J.

Energy 167
article thumbnail

Technology Short Take #87

Scott Lowe

Operating Systems/Applications. The series starts with part 0 (preparation), and continues with part 1 (mostly about rpm-ostree ), part 2 (container storage), part 3 (rebase, upgrade, and rollback), part 4 (package layering and experimental features), and part 5 (containerized and non-containerized applications). RIP Solaris.

Storage 60
article thumbnail

Security attacks and countermeasures

Cloud Musings

Access is precipitated through various communication methodologies, such as email and instant message (IM) attachments, endpoints in an IT environment, applications and other vulnerabilities within such infrastructures as discovered by the attacker. Rubenking, Neil J., “The Rubenking, Neil J., Rubenking, Neil J.,

Security 159
article thumbnail

Tips for Re-Designing Your Company Website

Galido

Content Management System. other application th?t sub-pages of a website i? nding page i? ?h?ng?d. page structure, it i? n a page whose content i? nd plan tim? ?nd nd resources t? ??m?l?t? u will l??? ??ur t be able to manage ??ur r enough t? ?t?nd d capture mechanism, ?n r, a member area, or ?n?

Company 100