Articles

Lead Image © Andrea Danti, 123RF.com

Lead Image © Andrea Danti, 123RF.com

Data Security vs. Data Protection

Data protection and data security are similar-sounding aspects of information security: one legal and one technical.
Photo by Stephen Pedersen on Unsplash

Photo by Stephen Pedersen on Unsplash

Isolate workloads from Docker and Kubernetes with Kata Containers

Kata Containers adds an additional layer of isolation, and Docker users don't even need to learn new commands.
Lead Image © krisckam, 123RF.com

Lead Image © krisckam, 123RF.com

The AWS CDK for software-defined deployments

Cloudy with a chance of better provisioning tools: The new Amazon Web Services Cloud Development Kit adds a powerful new tool to the DevOps toolkit.
Lead Image by Adarsh Kummur on Unsplash

Lead Image by Adarsh Kummur on Unsplash

New features in MariaDB 10.3

What lacked maturity in MariaDB 10.2 has now been sorted out in version 10.3. We look at the benefits you can reap now.
Lead Image © Bruce Rolff, 123RF.com

Lead Image © Bruce Rolff, 123RF.com

Forensic main memory analysis with Volatility

When you examine the memory of a computer after a break-in, take advantage of active support from the Volatility framework to analyze important memory structures and read the volatile traces of an attack.
Photo by Geran de Klerk on Unsplash

Photo by Geran de Klerk on Unsplash

Cyber security for the weakest link

The balance between IT threats and IT security is woefully unbalanced in a Windows environment, requiring the enforcement of company-wide security standards.
Photo by Rock'n Roll Monkey on Unsplash

Photo by Rock'n Roll Monkey on Unsplash

The new version of Chef Automate comes with many new features

Chef, one of the oldest automation solutions, seeks to become a universal administration robot for cloud environments with new version 2.0.
Lead Image © efks, 123RF.com

Lead Image © efks, 123RF.com

Cloud-native storage for Kubernetes with Rook

Kubernetes is known to be inflexible when it comes to persistent storage, but Rook now offers cloud-native storage and seeks to achieve harmony.
Lead Image © Peapop, Fotolia.com

Lead Image © Peapop, Fotolia.com

Migrate your workloads to the cloud

Move a workload to the cloud without trouble, and leverage cloud benefits for a conventional setup.
Lead Image © Steven Cukrov, 123rf.com

Lead Image © Steven Cukrov, 123rf.com

Link aggregation with kernel bonding and the Team daemon

The Linux world has different implementations for integrating multiple network cards: kernel old-timer ifenslave and the younger libteam.