Articles
Cryptographic key access in the cloud
Cryptographic keys, usually available locally but not on remote computers, can be accessed for use in cloud environments.
Validating Docker containers
A new test tool by Google lets you peek inside Docker containers, so you can make sure they hold exactly what you expect.
Open source customer relationship management software
SuiteCRM 7 is a powerful open source enterprise customer relationship management solution.
Isolate workloads from Docker and Kubernetes with Kata Containers
Kata Containers adds an additional layer of isolation, and Docker users don't even need to learn new commands.
Data Security vs. Data Protection
Data protection and data security are similar-sounding aspects of information security: one legal and one technical.
The AWS CDK for software-defined deployments
Cloudy with a chance of better provisioning tools: The new Amazon Web Services Cloud Development Kit adds a powerful new tool to the DevOps toolkit.
New features in MariaDB 10.3
What lacked maturity in MariaDB 10.2 has now been sorted out in version 10.3. We look at the benefits you can reap now.
Cyber security for the weakest link
The balance between IT threats and IT security is woefully unbalanced in a Windows environment, requiring the enforcement of company-wide security standards.
Forensic main memory analysis with Volatility
When you examine the memory of a computer after a break-in, take advantage of active support from the Volatility framework to analyze important memory structures and read the volatile traces of an attack.
The new version of Chef Automate comes with many new features
Chef, one of the oldest automation solutions, seeks to become a universal administration robot for cloud environments with new version 2.0.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Most Popular
Support Our Work
ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.