Archives


Motherboard Image

Revisiting the Graphic Interface for Windows Subsystem for Linux

When Tom first experimented with this technology, it was inelegant and not supported. That has changed dramatically.

'Tighter & Tighter' Cyber Insurance Regs: Assertions, Attestations and Reimbursements

Insurance companies are cracking down amid huge payouts for ransomware attacks.

Azure Container Apps Lead Big Cloud Push at Microsoft Build 2022

Microsoft announced the General Availability of Azure Container Apps at its big Build 2022 developer conference that was chock full of cloud-related news.

Study Finds Human Error Causes Pervasive Kubernetes Security Incidents

A new report on Kubernetes security found pervasive attacks that are hindering innovation, delaying application rollouts and causing other problems, many of which can be traced to human errors.

How Microsoft CIEM (CloudKnox) Addresses Cloud Management Challenges

Paul's verdict: "Microsoft CIEM will be a great solution for mid-sized and larger businesses, as the problem it solves is a crucial one to get right and it's impossible to do manually."

Penguin

How to Access Files on Windows Subsystem for Linux

Tom installs and uses Edge DX to monitor his WSL Linux instance and explains how to access files from and to Windows systems.

Blue Sky with Clouds Graphic

Cisco Describes Hybrid Cloud 'New Normal,' Touts Cloud Operating Model for Success

"Hybrid cloud environments have become the new normal, particularly as consumers of IT services have become more empowered to make cloud choices that fit their needs."

Revisiting Windows Subsystem for Linux: CLI Installation

Tom shows how to install WSL using the command line and then access files from the base Windows system.

Most/Least Popular Programming Languages for Cloud Development

Java tops most lists, but what languages are seen as least popular?

VMware Explore 2022 (Formerly VMworld) Focuses on Multi-Cloud Universe

The theme of the event is the Multi-Cloud Universe, with a focus on cloud transformation, cloud native platform, the hybrid workforce and cloud security.

Multi-Cloud Study Shows Complexity, Tool Sprawl, Siloed Data Challenges

A new report focusing on multi-cloud management reaffirms the huge growth in multi-cloud implementations while also detailing challenges concerning complexity, tool sprawl, siloed data and more.

Is the Kubernetes Skills Gap Shrinking?

New year-over-year findings in a Kubernetes/cloud native study conducted by Canonical show a smaller percentage of respondents listing "lack of in-house skills/limited manpower" as the biggest challenge when migrating to/using Kubernetes and containers, though it's still the No. 1 challenge.

Federal Security Agency Orders Emergency VMware Patching

The Cybersecurity and Infrastructure Security Agency (CISA) issued a May 18 emergency directive to all Federal Civilian Executive Branch agencies to mitigate vulnerabilities found in a slate of VMware offerings.

Survey Shows Limits of Ransomware Insurance, Payoffs

"Paying cybercriminals to restore data is not a data protection strategy."

Google Cloud to Offer Secure Open Source Software Service

Having enacted multiple internal security checks on the open source software (OSS) it uses, Google Cloud will offer a safe OSS service featuring those wares.

Supply Chain, Inflation Challenge Skills Dearth as Top Cloud Problem

While finding skilled workers has long plagued the cloud computing space, a new survey-based report shows some new challenges emerging, such as supply chain shortages and rising inflation.

Agencies Advance on Biden's 2021 Zero Trust Order

One year in, a new survey-based report indicates civilian and federal agencies are making progress on President Joe Biden's 2021 executive order to improve the nation's cybersecurity.

Bring Down Your AWS EC2 Storage Costs by Finding Orphaned Volumes

Instead of sifting through the EBS console to look for volumes that might not be in use, a more practical option is to use the AWS Trusted Advisor.

Controlling Linux Printers from the Command Line

Tom shares some of the commands that he uses and shares a script framework he uses for error checking.

Microsoft Offers Human Cybercrime Experts: 'Technology Alone Is Not Enough'

New managed security services from Microsoft combine humans with technology to help organizations in the fight against cybercrime.

Subscribe on YouTube