Articles

Unequal Pair  

Data protection and data security are similar-sounding aspects of information security: one legal and one technical.

Gimme the Key  

Cryptographic keys, usually available locally but not on remote computers, can be accessed for use in cloud environments.

Container Inspection  

A new test tool by Google lets you peek inside Docker containers, so you can make sure they hold exactly what you expect.

Custom Sales  

SuiteCRM 7 is a powerful open source enterprise customer relationship management solution.

Cloud Creator  

Today's OpenStack has become a mature product with automated asset configuration tools, including cloud-init, a powerful script that saves time by automatically configuring a large number of virtual servers in the cloud.

Preparing to Move  

Move a workload to the cloud without trouble, and leverage cloud benefits for a conventional setup.

Memory  

Kubernetes is known to be inflexible when it comes to persistent storage, but Rook now offers cloud-native storage and seeks to achieve harmony.

Secret, Quick, Quiet  

The balance between IT threats and IT security is woefully unbalanced in a Windows environment, requiring the enforcement of company-wide security standards.

Fingerprints  

When you examine the memory of a computer after a break-in, take advantage of active support from the Volatility framework to analyze important memory structures and read the volatile traces of an attack.

Dreaming of Clouds  

Cloudy with a chance of better provisioning tools: The new Amazon Web Services Cloud Development Kit adds a powerful new tool to the DevOps toolkit.
Powered by eZ Publish™ CMS Open Source Web Content Management. Copyright © 1999-2014 eZ Systems AS (except where otherwise noted). All rights reserved.