Posts in category

Software


Red Hat, Inc., the world’s leading provider of open source solutions, introduced new data resilience capabilities for cloud-native workloads with the release of Red Hat OpenShift Container Storage 4.6. This offering from Red Hat Data Services enables customers to extend their existing data protection solutions and infrastructure to enhance data resilience for cloud-native workloads across …

Here’s how I configured a VirtualBox VM to use a physical Windows drive on my Linux workstation. I use VirtualBox frequently to create virtual machines for testing new versions of Fedora, new application programs, and lots of administrative tools like Ansible. I have even used VirtualBox to test the creation of a Windows guest host. …

Explore Python (and other programming languages) by writing a “guess the number” game. In this series, we’re writing the same application in different programming languages to compare how various languages work and to show how using a standard test program is a great way to learn new ways to program. When you learn a new programming language, …

Software intelligence company Dynatrace announced the findings of an independent global survey of 700 CIOs, which reveals IT leaders have growing concerns about their ability to keep up with digital transformation. Traditional IT operating models with siloed teams and multiple monitoring and management solutions are proving ineffective at keeping up with cloud-native architectures. As a …

It takes about an hour to make an outdated Mac useful again with Fedora. Recently, I stumbled on an old MacBook Pro 13″ from late 2011, with a 125GB SSD and 8GB RAM. I’ve taken this machine on trips around the world, and back in the day, I ran many a session, workshop, or demo …

Take advantage of all of the powers the almighty Linux command line has to offer. The Linux command line provides a great deal of flexibility. Whether you are managing a server or launching a terminal window on a desktop system, the command line brings with it an extensive toolkit to update files, tweak system performance, …

As we start the new year, we see ongoing revelations about an attack involving SolarWinds and others, that in turn led to the compromise of numerous other organizations. Software supply chain attacks like this pose a serious threat to governments, companies, non-profits, and individuals alike. At Google, we work around the clock to protect our …

Guest post originally published on InfraCloud’s blog by Frederick Fernando Let’s talk about Kubernetes security As Kubernetes continues to grow in adoption, it is important for us to know how to secure it. In a dynamic infrastructure platform such as Kubernetes, detecting and addressing threats is important but also challenging at the same time. Falco, …

When developing applications for Kubernetes, which is a distributed system, developers and platform engineers need to know both how to monitor them and understand how they impact their business. There are several tools available to instrument Kubernetes clusters and code, but figuring out which options are the right ones can be challenging. That’s why we …

At Citrix, we pride ourselves on delivering technologies that transform how people work. We create a rich experience that helps users be more productive and improves the experience for admins managing Citrix workloads, wherever they’re hosted. When developing innovative features for Citrix Virtual Apps and Desktops, we always examine ways to further improve the end …