Remove Comparison Remove Operating Systems Remove Software Development Remove Virtualization
article thumbnail

Microsoft secures your place in the world of business

Dataconomy

The Microsoft Certified Solutions Associate and Microsoft Certified Solutions Expert certifications cover a wide range of topics related to Microsoft’s technology suite, including Windows operating systems, Azure cloud computing, Office productivity software, Visual Studio programming tools, and SQL Server databases.

article thumbnail

Technology Short Take #80

Scott Lowe

Gabriele Gerbino has a nice write-up about Cisco’s efforts with APIs ; his article includes a brief description of YANG data models and a comparison of working with network devices via SSH or via API. Operating Systems/Applications. Virtualization. installation caused by duplicate NSX Manager UUIDs.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Technology Short Take #49

Scott Lowe

I highly recommend you read the entire post, but in short the five skills Matt recommends are software skills (which includes configuration management and software development tools like Git ), Linux, deep protocol knowledge, hypervisor and container networking, and IPv6. Operating Systems/Applications.

Vmware 60
article thumbnail

Technology Short Take 139

Scott Lowe

Operating Systems/Applications. This announcement of the Scarf Gateway popped into my Twitter timeline recently, and after taking a look at how the Scarf Gateway is described I can see how this is an important addition to companies’ secure software supply chain efforts, especially in the beginning. Virtualization.

Vmware 60
article thumbnail

The Hacker Mind: Shellshock

ForAllSecure

This episode looks at how fuzz testing has evolved over the years, how open source projects have for the most part gone untested over time, and how new efforts to match fuzzing to software development are today helping to discover dangerous new vulnerabilities before they become the next Shellshock. How did this happen?

article thumbnail

The Hacker Mind: Shellshock

ForAllSecure

This episode looks at how fuzz testing has evolved over the years, how open source projects have for the most part gone untested over time, and how new efforts to match fuzzing to software development are today helping to discover dangerous new vulnerabilities before they become the next Shellshock. How did this happen?