-
+19 +3
Docker and Kubernetes founders talk about the future of cloud
The people who helped build today's open-source, cloud-native computing world talk about where we go from here.
-
+18 +2
A Decade of Docker
We all use containers today, but until Docker came along, they were rarely used. Here's Docker's story.
-
+27 +1
You'll Soon Be Using Vulnerability Exploitability eXchange
The Vulnerability Exploitability eXchange (VEX) is a Cybersecurity and Infrastructure Security Agency (CISA) working specification that is meant to be a machine-readable security advisory.
-
+24 +3
No More Mr. Nice Guy: GitHub Demands Developers Use 2FA
GitHub has decided that starting on March 13, GitHub users must begin enrolling in two-factor authorization (2FA).
-
+20 +5
5 Microservices Misconceptions
Many misconceptions about microservices persist, often to the detriment of companies hoping it’s a silver bullet to solve all their problems.
-
+11 +2
Techniques for Scaling Applications with a Database
Scaling is one of the hardest tasks to accomplish with a database. This article explains how scaling works, under the hood.
-
+28 +3
Who writes Linux and open source software?
Developers and, more to the point, the companies that employ them
-
+25 +3
Combining SBOMs With Security Data: Chainguard's OpenVEX
Chainguard has added support for Vulnerability Exploitability eXchange (VEX) to Software Bill Of Materials (SBOMs) in an implementation called OpenVEX. #cybersecurity #SBOMs #VEX
-
+31 +4
Supercloud, multi-cloud, bigly cloud?
When we first heard about supercloud, we assumed it was yet another new cloud hype term with no substance – but we were wrong. (Yes, Silverlinings admits when we are wrong.) | No matter what it's called the concept of enabling architects and developers to treat multiple clouds as if it were one cloud is legit.
-
+18 +1
How AWS uses eBPF to identify security risks
It's not just AWS though. The Linux kernel's eBPF is used for cloud security everywhere.
-
+18 +3
A Cat Lover's Guide to Understanding JSON Databases
Learn about JSON databases and learn the benefits of human-readable, lightweight, and flexible data storage with examples from a pet cat's viewpoint.
-
+26 +3
10 Years of Dell XPS13 developer laptops
For a decade, Dell has been making top-of-the-line Ubuntu Linux-powered developer laptops. Here's the story behind the machines.
-
+18 +3
Is cloud-native the new development normal?
In 2022, the Cloud Native Computing Foundation (CNCF) and Linux Foundation Research
-
+26 +2
The Open Source Initiative improves its licensing rules
What's what with The Open Source Initiative—defenders of the open source definition—is making the approval process for new open-source licenses clearer and easier.open-source news.
-
+4 +1
Optimizing Redis’ Default Compiler Flags
Redis and Intel teamed up to find out whether applying more aggressive optimization options would improve overall Redis baseline performance. Our conclusion: Yes! By changing the compiler behavior, we measured a 5.13% boost overall and more in some cases.
-
+21 +5
The Marketing Buzzwords That Developers Hate
Developers know that vendors must tout their products, but they are less understanding when the marketing language is an immediate turnoff.
-
+15 +1
Turbocharge Cloud Spanner with Redis Enterprise Active-Active for Global Real-Time Applications
Redis Enterprise’s Active-Active Geo-Distribution and Google Cloud Spanner’s replication work together to provide a unified real-time data layer for geo-distributed applications. Here’s how they connect and the benefits the tech provides.
-
+31 +8
What's what with Wolfi, the Linux "undistribution," and ARM | Open Source Watch
What's what with open-source news.
-
+34 +5
Building up Rust
What's whaRust supports its contributors, from developers to writers to videographers.
-
+21 +5
Redis Data Types: The Basics
Redis data types can be complex, structured and powerful. This introduction summarizes how and when to use some essential data types.
Submit a link
Start a discussion