Blog

Últimas noticias sobre Cloud Computing, AWS, Kubernetes, OpenShift, Ansible, Jenkins y mucho más!

Blog: Physics, politics and Pull Requests: the Kubernetes 1.18 release interview

Author: Craig Box (Google) The start of the COVID-19 pandemic couldn’t delay the release of Kubernetes 1.18, but unfortunately a small bug could — thankfully only by a day. This was the last cat that needed to be herded by 1.18 release lead Jorge Alarcón before the release on March 25. One of the best Read more about Blog: Physics, politics and Pull Requests: the Kubernetes 1.18 release interview[…]

Git Plugin Performance Improvement Phase-2 Progress

The second phase of the Git Plugin Performance Improvement project has been great in terms of the progress we have achieved in implementing performance improvement insights derived from the phase one JMH micro-benchmark experiments. What we’ve learned so far in this project is that a git fetch is highly correlated to the size of the Read more about Git Plugin Performance Improvement Phase-2 Progress[…]

How To Launch Child Processes in Node.js

The author selected the COVID-19 Relief Fund to receive a donation as part of the Write for DOnations program. Introduction When a user executes a single Node.js program, it runs as a single operating system (OS) process that represents the instance of the program running. Within that process, Node.js executes programs on a single thread. Read more about How To Launch Child Processes in Node.js[…]

How To Configure Remote Access for MongoDB on Ubuntu 20.04

An earlier version of this tutorial was written by Melissa Anderson. Introduction MongoDB, also known as Mongo, is an open-source document database used commonly in modern web applications. By default, it only allows connections that originate on the same server where it’s installed. If you want to manage MongoDB remotely or connect it to a Read more about How To Configure Remote Access for MongoDB on Ubuntu 20.04[…]

How To Secure MongoDB on Ubuntu 20.04

An earlier version of this tutorial was written by Melissa Anderson. Introduction MongoDB, also known as Mongo, is an open-source document database used in many modern web applications. It is classified as a NoSQL database because it does not rely on a traditional table-based relational database structure. Instead, it uses JSON-like documents with dynamic schemas. Read more about How To Secure MongoDB on Ubuntu 20.04[…]

How to Install MongoDB on Ubuntu 20.04

An earlier version of this tutorial was written by Melissa Anderson. Introduction MongoDB, also known as Mongo, is an open-source document database used in many modern web applications. It is classified as a NoSQL database because it does not rely on a traditional table-based relational database structure. Instead, it uses JSON-like documents with dynamic schemas, Read more about How to Install MongoDB on Ubuntu 20.04[…]

New – Using Amazon GuardDuty to Protect Your S3 Buckets

As we anticipated in this post, the anomaly and threat detection for Amazon Simple Storage Service (S3) activities that was previously available in Amazon Macie has now been enhanced and reduced in cost by over 80% as part of Amazon GuardDuty. This expands GuardDuty threat detection coverage beyond workloads and AWS accounts to also help you protect your Read more about New – Using Amazon GuardDuty to Protect Your S3 Buckets[…]

Understanding Arrow Functions in JavaScript

The author selected the COVID-19 Relief Fund to receive a donation as part of the Write for DOnations program. Introduction The 2015 edition of the ECMAScript specification (ES6) added arrow function expressions to the JavaScript language. Arrow functions are a new way to write anonymous function expressions, and are similar to lambda functions in some Read more about Understanding Arrow Functions in JavaScript[…]

Automating Security with CyberArk and Red Hat Ansible Automation Platform

Proper privilege management is crucial with automation. Automation has the power to perform multiple functions across many different systems. When automation is deployed enterprise-wide, across sometimes siloed teams and functions, enterprise credential management can simplify adoption of automation — even complex authentication processes can be integrated into the setup seamlessly, while adding additional security in Read more about Automating Security with CyberArk and Red Hat Ansible Automation Platform[…]