Articles
Isolate workloads from Docker and Kubernetes with Kata Containers
Kata Containers adds an additional layer of isolation, and Docker users don't even need to learn new commands.
Data Security vs. Data Protection
Data protection and data security are similar-sounding aspects of information security: one legal and one technical.
The AWS CDK for software-defined deployments
Cloudy with a chance of better provisioning tools: The new Amazon Web Services Cloud Development Kit adds a powerful new tool to the DevOps toolkit.
New features in MariaDB 10.3
What lacked maturity in MariaDB 10.2 has now been sorted out in version 10.3. We look at the benefits you can reap now.
Cyber security for the weakest link
The balance between IT threats and IT security is woefully unbalanced in a Windows environment, requiring the enforcement of company-wide security standards.
Forensic main memory analysis with Volatility
When you examine the memory of a computer after a break-in, take advantage of active support from the Volatility framework to analyze important memory structures and read the volatile traces of an attack.
The new version of Chef Automate comes with many new features
Chef, one of the oldest automation solutions, seeks to become a universal administration robot for cloud environments with new version 2.0.
Migrate your workloads to the cloud
Move a workload to the cloud without trouble, and leverage cloud benefits for a conventional setup.
Cloud-native storage for Kubernetes with Rook
Kubernetes is known to be inflexible when it comes to persistent storage, but Rook now offers cloud-native storage and seeks to achieve harmony.
Improved defense through pen testing
Discover indicators of compromise with open source pen testing tools.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Most Popular
Support Our Work
ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.