Cloud Computing

At the mercy of social media

And I don’t mind ads. In fact, I like that most social networks endeavor to show me ads based on my interests and search...

Why are we still confused about cloud security?

A report by cloud security company Tenable discovered that 74% of companies surveyed had exposed storage or other misconfigurations. This is...

NordVPN implements post-quantum cryptography in Linux App

NordVPN has integrated post-quantum cryptography into its Linux application, marking an early adoption of this technology in the consumer VPN market.This move addresses...

Making generative AI work for you

The key, he says, is to figure out how to get value from genAI assistants despite their failings, by maintaining appropriate control. He...

Open source package entry points could be used for command jacking

npm (the Node.js package manager) pip (the Python package installer) git (a version control system) kubectl (a Kubernetes command-line tool) terraform (an Infrastructure as Code tool) gcloud (Google...

The new Catalyst ESS9300: Transforming critical military communications through open standards

Today I am happy to unveil the new Catalyst ESS9300 Embedded Series switch based on open standards adopted by the US Department of...

Modernized Security for Government Agencies

With an increasing number of organizations in the U.S. public sector and government relying on cloud services and interconnected systems, the need for...

How do we fund open source?

Foundations also can help in more indirect ways, like mentorship, recognition, and community support, and by providing metrics to help business owners quantify...

Making genAI work for you

The key, he says, is to figure out how to get value from genAI assistants despite their failings, by maintaining appropriate control. He...

Latest articles