Remove Guidelines Remove Hardware Remove Open Source Remove Operating Systems
article thumbnail

Technology Short Take 151

Scott Lowe

Servers/Hardware. The story of a developer deliberately polluting their open source projects—as outlined here for the “colors.js” Via the Kubernetes blog, Rory McCune of Aqua Security provides some guidelines for securing admission controllers. Operating Systems/Applications.

article thumbnail

Technology Short Take 114

Scott Lowe

Courtesy of Tigera, Alex Pollitt shares some guidelines on when Linux conntrack is no longer your friend. Servers/Hardware. The CNCF blog has a great article written by an Alibaba software engineer (Xingyu Chen) on some performance optimizations for etcd that have been contributed back to the open source community.

Linux 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take 106

Scott Lowe

Servers/Hardware. Serve The Home takes a critical look at the Bloomberg Supermicro stories, debunking or at least calling into question many details of the alleged hardware hack as reported by Bloomberg. Non-code contributions are, in my opinion, an important but oft-overlooked aspect of open source communities.

article thumbnail

what every open source project needs

SPF13

In the last few years open source has transformed the software industry. From Android to Wikipedia, open source is everywhere, but how does one succeed in it? What Every Successful Open Source Project Needs. spf13 Chief Operator @ Docker? Open Source is taking over the world. Transcript.

article thumbnail

Technology Short Take 121

Scott Lowe

The one caveat to his approach that may be worth mentioning is that some policies (a PodSecurityPolicy or the use of Open Policy Agent) may prevent the user from launching a Pod connected to the host’s network namespace. Servers/Hardware. Operating Systems/Applications.

Vmware 60
article thumbnail

Technology Short Take #80

Scott Lowe

Servers/Hardware. As opposed to just encrypting data at the transport level (although Acra does that between components of its architecture) or just encrypting data at the storage level (using an encrypted file system or similar), Acra targets encrypting data at the table/row/column level within a database. Check back next time!

article thumbnail

Tech Blogs – Best Must Read Tech Resources 2019

Galido

These areas of tech include general IT and technology, security, IT feeds, cloud computing, data center, mobile, social media, tips and tricks, virtualization, and operating system and software blogs. Operating System & Software Blogs. TechWorld – Operating Systems. CIO Dashboard. Zero Day from ZDNet.

Resources 107