Unix, Linux, DevOps , Cloud computing and BigData Knowledge-Base
During the weekends, i normally check gurkulindia.com’s security analysis report. And this is the time where my sysadmin mind starts thinking like a security admin, just to understand the risks that my website having now. I know most of us will think about security during our...
Boot arguments may include more than one string. All argument strings are passed to the secondary boot program; they are not interpreted by OpenBoot. If any arguments are specified on the boot command line, then neither the boot-file nor the diag-file nvram variable is used. The...
The idea behind running BIND in a chroot jail is to limit the amount of access any malicious individual could gain by exploiting vulnerabilities in BIND. It is for the same reason that we run BIND as a non-root user. This should be considered as a...
Currently the Federal Government has limited choices for secure, compliant and supported Linux distributions and open source technologies, making procurement expensive and limits options for their workforce. Canonical offers professional services and support for the popular Ubuntu Linux distribution, as open source infrastructure and application technologies...
Ubuntu Core 20, a minimal, containerised version of Ubuntu 20.04 LTS for IoT devices and embedded systems, is now generally available. This new release enables innovators to create highly secure things and focus entirely on their own unique features and apps, with confinement and security updates...
Open source technologies, like Kubeflow, are increasingly being used for AI/ML and predictive modeling across industries. However, operationalising the model and building the AI/ML infrastructure requires planning, automation and a lot of DevOps resources. Our latest webinar provides real world application, with a demo on building...
Continue Reading — Getting Started With Performance Tuning
An Amazon Aurora Global Database is a single database that can span up to 6 AWS Regions, enabling disaster recovery from region-wide outages and low latency global reads. With today’s launch, you can seamlessly change your global cluster’s primary AWS Region, the region that serves writes,...
AWS Identity and Access Management (IAM) now allows administrators to use tags to manage and secure access to Customer Managed Policies, Instance Profiles, OpenID Connect Providers, SAML Providers, Server Certificates, and Virtual MFAs. Â
Continue Reading — AWS Identity and Access Management now supports tags...
When running profile jobs in AWS Glue DataBrew to auto-generate 40+ data quality statistics like column-level cardinality, numerical correlations, unique values, standard deviation, and other statistics, you can now configure the size of the dataset yo…
Continue Reading — AWS Glue DataBrew now allows you...