Articles
Data Security vs. Data Protection
Data protection and data security are similar-sounding aspects of information security: one legal and one technical.
Isolate workloads from Docker and Kubernetes with Kata Containers
Kata Containers adds an additional layer of isolation, and Docker users don't even need to learn new commands.
Cryptographic key access in the cloud
Cryptographic keys, usually available locally but not on remote computers, can be accessed for use in cloud environments.
New features in MariaDB 10.3
What lacked maturity in MariaDB 10.2 has now been sorted out in version 10.3. We look at the benefits you can reap now.
Open source customer relationship management software
SuiteCRM 7 is a powerful open source enterprise customer relationship management solution.
Automated OpenStack instance configuration with cloud-init and metadata service
Today's OpenStack has become a mature product with automated asset configuration tools, including cloud-init, a powerful script that saves time by automatically configuring a large number of virtual servers in the cloud.
Validating Docker containers
A new test tool by Google lets you peek inside Docker containers, so you can make sure they hold exactly what you expect.
Security with PowerShell 5
Despite the growing exploitation of PowerShell's scripting language by hackers, the tool's security features also offer a line of defense.
New plans for Jenkins
A new course is proposed for the continuous integration/continuous delivery Jenkins service that includes a cloud-native version.
A storage engine for every use case
You can choose from among a number of open source database storage engines for both general and specialized data.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Most Popular
Support Our Work
ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.
