Remove Comparison Remove Construction Remove Linux Remove Windows
article thumbnail

Technology Short Take #50

Scott Lowe

Kevin Houston’s March 2015 blade server comparisons might be a useful place to start. It’s important to note that these security enhancements don’t really represent “net new” functionality but rather reflect existing Linux security constructs now being exposed and usable by Docker.

Vmware 60
article thumbnail

Kaskada data scientist Charna Parkey likes to work in areas that can ‘dramatically change the world’

GeekWire

” “I love learning new intricate things from how materials interact in woodworking, robotics and construction, to watercoloring or using fibers to create beautifully woven blankets,” she said. Mac, Windows or Linux? .” When she’s not working, Parkey considers herself “a collector of hobbies.”

Data 84
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind: Shellshock

ForAllSecure

After testing Unix, Miller went to fuzz Windows NT and other systems. used vulnerabilities in sendmail and the fingerd protocol to construct unintentionally what would become the first internet worm. And it's on your Mac, and virtually any company that runs the Linux operating system. What’s a worm?

article thumbnail

The Hacker Mind: Shellshock

ForAllSecure

After testing Unix, Miller went to fuzz Windows NT and other systems. used vulnerabilities in sendmail and the fingerd protocol to construct unintentionally what would become the first internet worm. And it's on your Mac, and virtually any company that runs the Linux operating system. What’s a worm?