Winners and Losers: The Global Economy After COVID | Newgeography.com
VMware Redefines Security After a Surge in Attacks – The New Stack
Enterprise virtualization software giant says it is “redefining” security as it seeks to help customers meet the challenges associated with a skyrocketing number of threats, more numerous attack vectors, and having fewer human resources at their disposal to help keep attacks at bay. “So what we're asking all of these IT security teams to do…
Private vs. Public Cloud: How Kubernetes Shifts the Balance – The New Stack
One thing is certain: If you’re an enterprise, you either are using the cloud or soon will be in some capacity. Odds are that your organization is well on its way to being a hybrid cloud user. A 2021 Statista survey of 750 enterprises found that 82% had adopted a hybrid cloud computing strategy. This…
Manage Resources in Kubernetes | Programming With Wolfgang
Kubernetes is a great tool but it also has a steep learning curve. You should manage the cluster resources with request and resource limits in your pods.
Jessica Cherry | Opensource.com
Meet the IT guy who led authorities to El Chapo's secrets | CNN
From his hideout in the mountains of Northwest Mexico, Joaquin "El Chapo" Guzman took pleasure in secretly listening in on the conversations of his wife, mistress and cartel associates, thanks to spyware the cartel leader had installed on their cell phones by an IT technician.
The Drug Cartels' IT Guy
The story of Felipe Peréz, a communications specialist reportedly kidnapped by a Mexican drug cartel, and forced into a shadow hacker squad that engineers the gang's hidden radio network.
Hotjar: Website Heatmaps & Behavior Analytics Tools
See how visitors are really using your website, collect user feedback and turn more visitors into customers.
Introducing the First Report on the State of Tech Hiring Around the World - HackerRank Blog
HackerRank's first state-of-the-industry report features insights gathered from 1000+ respondents across 50+ countries to showcase how companies stack up in the war for tech talent.
Managing Resources for Containers | Kubernetes
When you specify a Pod, you can optionally specify how much of each resource a Container needs. The most common resources to specify are CPU and memory (RAM); there are others. When you specify the resource request for Containers in a Pod, the scheduler uses this information to decide which node to place the Pod on. When you specify a resource limit for a Container, the kubelet enforces those limits so that the running container is not allowed to use more of that resource than the limit you set.
The Seattle Streets We Really Hate - Slog - The Stranger
Here's our top five.
Git and Branch Naming – Software Freedom Conservancy « Adafruit Industries – Makers, hackers, artists, designers and engineers!
From June of last year, adding this to the ongoing efforts … Regarding Git and Branch Naming – Software Freedom Conservancy – Both Conservancy and the Git project are aware that t…
Germany Came to Terms with Its Nazi Past. Why Can’t America Do the Same with Slavery?
For the Washington Post, Michele Norris wonders what it will take for the US to finally and fully acknowledge its history of slavery. America experienced 246 years of slavery before it was officially ended with the pass
How Netflix uses eBPF flow logs at scale for network insight | by Netflix Technology Blog | Jun, 2021 | Netflix TechBlog
By Alok Tiagi, Hariharan Ananthakrishnan, Ivan Porto Carrero and Keerti Lakshminarayan
The runtime verification subsystem [LWN.net]
The realtime project has been the source of many of the innovations that have found their way into the core kernel in the last fifteen years or so. There is more to it than that, though; the wider realtime community is also doing interesting work in a number of areas that go beyond ensuring deterministic response. One example is Daniel Bristot de Oliveira's runtime verification patch set, which can monitor the kernel to ensure that it is behaving the way one thinks it should.
Securing Pipelines Through Secrets Management – The New Stack
Secrets management plays a critical role in keeping your pipelines and applications secure. While secrets management tools help, you need to implement best practices and processes to successfully manage secrets in a DevOps environment. Standardizing, automating and integrating these processes also helps secure secrets by reducing the chance of human error. In this article, we…
Share And Control Terminals In Real Time From Web Browser - OSTechNix
This guide explains how to share and control terminals in real time from web browser with end-to-end encryption using TermPair in Linux.
White supremacy was on trial at Washington and Lee University. It won.
The jury at Washington and Lee harkens back to Jim Crow juries—white, male, privileged, and rigged.
Preflight Defends Against Supply Chain Attacks with Single Line of Code – The New Stack
Spectral, a cybersecurity company that prides itself on being "developer first," has released Preflight, an open source tool to help prevent a chain of supply attacks. While these attacks can take different forms, such as the widely publicized Solar Winds hack, they are broadly categorized as attacks wherein access is gained via a third party…
What about a national packet-switched drone delivery network (Interconnected)
Posted on Monday 7 Jun 2021. 1,413 words, 11 links. By Matt Webb.
Strimio – A Beautiful Modern Radio Streaming App
Odio is a new, free, beautiful, and open source software for streaming radio stations with an intuitive UI that resembles that of Spotify with a search field.
Pluralistic: 07 Jun 2021 – Pluralistic: Daily links from Cory Doctorow
Pluralistic: 07 Jun 2021 – Pluralistic: Daily links from Cory Doctorow
How do Databases Compare for Serverless Functions and Containers? | by AsyncBanana | Jun, 2021 | AWS in Plain English
Comparing Serverless Databases: Firestore, DyanmoDB, Cosmos DB, and More
Strimio - All your radio stations and TV channels in one place, free.
Strimio is a free cloud-based streaming service that provides you access to tens of thousands of live streams from all over the world.
Pluralistic: 07 Jun 2021 – Pluralistic: Daily links from Cory Doctorow
Pluralistic: 07 Jun 2021 – Pluralistic: Daily links from Cory Doctorow
Fixing Risk Sharing With Observability - DevOps.com
Adopting pervasive instrumentation and observability gives SREs and ops teams critical visibility into app and infrastructure environments.
How to Set Up a Headless Raspberry Pi, No Monitor Needed | Tom's Hardware
By tweaking a few files on its microSD card, you can set your Raspberry Pi for remote access without ever attaching a monitor or keyboard.
Test arbitrary pod failures on Kubernetes with kube-monkey | Opensource.com
I have covered multiple chaos engineering tools in this series.