Full Article : Linux.com – https://www.linux.com/news/usenet-facebook-second-time-farce Facebook repeats the pattern of USENET, this time as farce. As a no-holds-barred Wild West sort of social network, USENET was filled with everything we rightly complain about today. … Read more
Full Article : Linux.com – https://www.linux.com/news/6-creative-ways-solve-problems-linux-containers-and-docker Most people are introduced to Docker and Linux containers as a way to approach solving a very specific problem they are experiencing in their organization. The problem they want … Read more
Full Article : Linux.com – https://www.linux.com/news/evolution-systems-requires-evolution-systems-engineers The systems we worked on when many of us first started out were the first generations of client-server applications. They were fundamentally different from the prior generation: terminals connecting … Read more
Full Article : Linux.com – https://www.linux.com/news/choosing-tool-track-and-mitigate-open-source-security-vulnerabilities To successfully deal with open source security, you need your developers (and DevOps teams) to operate the solution. Given the fast pace of modern development, boosted in part by … Read more
Full Article : Linux.com – https://www.linux.com/news/integrating-continuous-testing-improved-open-source-security Preventing new security flaws is conceptually simple, and very aligned with your (hopefully) existing quality control. Because vulnerabilities are just security bugs, a good way to prevent them is … Read more
Full Article : Linux.com – https://www.linux.com/news/mitigating-known-security-risks-open-source-libraries This is an excerpt from Securing Open Source Libraries, by Guy Podjarny.
Full Article : Linux.com – https://www.linux.com/news/introducing-rllib-composable-and-scalable-reinforcement-learning-library In a previous post, I outlined emerging applications of reinforcement learning (RL) in industry.
Full Article : Linux.com – https://www.linux.com/news/finding-vulnerable-open-source-packages Finding Vulnerable Packages Now that you understand what a known vulnerability is, let’s start going through the four steps needed to address them: find, fix, prevent, and respond. The … Read more
Full Article : Linux.com – https://www.linux.com/news/7-systems-engineering-and-operations-trends-watch-2018 We asked members of the 2018 O’Reilly Velocity Conference program committee for their take on the tools and trends that will change how you work. Below you’ll find the insights that … Read more
Full Article : Linux.com – https://www.linux.com/news/engineering-incremental-change This chapter from Building Evolutionary Architectures describes architectures that support incremental change along with some of the engineering practices used to achieve incremental change.