Remove Linux Remove Malware Remove Software Development Remove Storage
article thumbnail

25 Feb Cloudera Federal Forum in Tysons Corner: Amazing agenda filled with lessons learned and best practices

CTOvision

Dr. Daniel Duffy is head of the NASA Center for Climate Simulation (NCCS, Code 606.2), which provides high performance computing, storage, networking, and data systems designed to meet the specialized needs of the Earth science modeling communities. High Performance Computing Lead, NASA Center for Climate Simulation (NCCS). Eddie Garcia.

article thumbnail

Join Architects, Planners, Program Managers, Data Scientists at 4th Annual Cloudera Federal Forum in DC 25 Feb

CTOvision

Dr. Daniel Duffy is head of the NASA Center for Climate Simulation (NCCS, Code 606.2), which provides high performance computing, storage, networking, and data systems designed to meet the specialized needs of the Earth science modeling communities. High Performance Computing Lead, NASA Center for Climate Simulation (NCCS). Eddie Garcia.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Technology Short Take 139

Scott Lowe

In this post , Jakub Sitnicki digs way deep into the Linux kernel to uncover the answer to the question, “Why are there no entries in the conntrack table for SYN packets dropped by the firewall?” Linux malware is getting more sophisticated. ” Get ready to get nerdy! Servers/Hardware. Virtualization.

Vmware 60
article thumbnail

The Hacker Mind Podcast: Hunting The Next Heartbleed

ForAllSecure

Vamosi: Rauli and I started by discussing the big picture: the beginning of the software development lifecycle, when the code is first developed, but then there’s also the other side, after the software is released and a vulnerability is found. I’ll let him introduce himself. Kaksonen: Please do not.

article thumbnail

The Hacker Mind Podcast: Hunting The Next Heartbleed

ForAllSecure

Vamosi: Rauli and I started by discussing the big picture: the beginning of the software development lifecycle, when the code is first developed, but then there’s also the other side, after the software is released and a vulnerability is found. I’ll let him introduce himself. Kaksonen: Please do not.

article thumbnail

The Hacker Mind Podcast: Hunting The Next Heartbleed

ForAllSecure

Vamosi: Rauli and I started by discussing the big picture: the beginning of the software development lifecycle, when the code is first developed, but then there’s also the other side, after the software is released and a vulnerability is found. I’ll let him introduce himself. Kaksonen: Please do not.