Remove How To Remove Open Source Remove Operating Systems Remove Virtualization
article thumbnail

How to manage cloud exploitation at the edge

CIO Business Intelligence

Companies that have embraced the cloud need to understand the Shared Responsibility Model: a security and compliance framework that explains what shared infrastructure and systems the cloud provider is responsible for maintaining and how a customer is responsible for operating systems, data, and applications utilizing the cloud.

Cloud 98
article thumbnail

Technology Short Take 175

Scott Lowe

Networking The good folks over at Packet Pushers have compiled a list of open source networking projects. Cloud Computing/Cloud Management Josh Biggley shows how to deploy Tetragon with Cribl Edge. Ivan Yurochko of PerfectScale discusses how to manage S3 throttling. I hope you find something useful here!

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Technology Short Take 176

Scott Lowe

Networking Lee Briggs (formerly of Pulumi, now with Tailscale) shows how to use the Tailscale Operator to create “free” Kubernetes load balancers (“free” as in no additional charge above and beyond what it would normally cost to operate a Kubernetes cluster). Thanks for reading! This is a handy trick.

Linux 112
article thumbnail

Technology Short Take 173

Scott Lowe

Quintessence Anx of SPIRL shares some guidance on how to construct SPIFFE IDs. A set of vulnerabilities in the open source reference implementation of the UEFI specification has been uncovered. I think I’ve linked to Ricardo Sueiras’ “AWS open source newsletter” before; it’s such a useful resource.

article thumbnail

How to switch an old Windows laptop to Linux

The Verge

For all your other desktop software needs, there’s usually a free, open-source program that can do just as good a job. If that doesn’t work for your office’s Windows-only programs, you can always keep running Windows 7, with a lot less danger, on a virtual machine (VM) on Linux. Gimp , for example, instead of Photoshop.

Linux 106
article thumbnail

Technology Short Take 161

Scott Lowe

Atulpriya Sharma illustrates how to use DNS-based routing (with Argo Rollouts and Azure Traffic Manager) to implement a blue/green deployment strategy. The open source ko project has applied to become a CNCF Sandbox project. Tim Myers shares how to set up continuous deployment of infrastructure-as-code using GitHub Actions.

article thumbnail

Technology Short Take 150

Scott Lowe

The Log4J vulnerability and associated exploits has been on many folks' minds, so it’s only natural that many security companies have been looking into how to mitigate this attack vector. Kevin Swiber shows how to use Postman to deploy an application onto a Kubernetes cluster. Operating Systems/Applications.