Articles

Photo by Geran de Klerk on Unsplash

Photo by Geran de Klerk on Unsplash

Cyber security for the weakest link

The balance between IT threats and IT security is woefully unbalanced in a Windows environment, requiring the enforcement of company-wide security standards.
Photo by Rock'n Roll Monkey on Unsplash

Photo by Rock'n Roll Monkey on Unsplash

The new version of Chef Automate comes with many new features

Chef, one of the oldest automation solutions, seeks to become a universal administration robot for cloud environments with new version 2.0.
Lead Image © efks, 123RF.com

Lead Image © efks, 123RF.com

Cloud-native storage for Kubernetes with Rook

Kubernetes is known to be inflexible when it comes to persistent storage, but Rook now offers cloud-native storage and seeks to achieve harmony.
Lead Image © Peapop, Fotolia.com

Lead Image © Peapop, Fotolia.com

Migrate your workloads to the cloud

Move a workload to the cloud without trouble, and leverage cloud benefits for a conventional setup.
Lead Image © Steven Cukrov, 123rf.com

Lead Image © Steven Cukrov, 123rf.com

Link aggregation with kernel bonding and the Team daemon

The Linux world has different implementations for integrating multiple network cards: kernel old-timer ifenslave and the younger libteam.
Lead Image Photo by Simeon Jacobson on Unsplash

Lead Image Photo by Simeon Jacobson on Unsplash

Improved defense through pen testing

Discover indicators of compromise with open source pen testing tools.
Photo by Damon Lam on Unsplash

Photo by Damon Lam on Unsplash

Open source multipoint VPN with VyOS

The VyOS Linux distribution puts network routing, firewall, and VPN functionality together and presents a fully working dynamic multipoint VPN router as an alternative or addition to a Cisco DMVPN mesh.
Lead Image © Kheng Ho Toh, 123rf.com

Lead Image © Kheng Ho Toh, 123rf.com

Optimization and standardization of PowerShell scripts

When PowerShell one-liners become full-blown scripts that have an effect throughout the enterprise, IT managers need to review their software development strategies. We look at PowerShell best practices for script design, notation, error handling, and documentation.
Lead Image © Lucy Baldwin, 123RF.com

Lead Image © Lucy Baldwin, 123RF.com

Assess USB performance while exploring storage caching

Use dd fluently to compare disk performance.
Lead Image © Andrea De Martin, 123RF.com

Lead Image © Andrea De Martin, 123RF.com

Workflow-based data analysis with KNIME

They say data is "the new oil," but all that data you collect is only valuable if it leads to new insights. An open source analysis tool called KNIME lets you analyze data through graphical workflows – without the need for programming or complex spreadsheet manipulation.