Don't you sometimes just wish this amazing Information Technology business we're in was just a little different? That tech just worked? That there was one standard instead of eight? That security wasn't an afterthought. And that all apps weren't tested in production under the guise of DevOps?
Why use third-party security tools for Active Directory account cleanups when the ubiquitous PowerShell serves just as well?
Tom shows how to use Docker Compose to deploy PostgreSQL and pgAdmin from a file.
The mission is to provide a collaboration space for diverse industries to work on developing a metaverse that is inclusive, global, vendor-neutral and scalable.
Tom demos table joins, shell scripts for repetitive tasks and using "exec" to run commands inside a container from the host system.
WEF publishes two reports discussing interoperability and demystifying the consumer metaverse (while explaining the difference between "web3" and "Web 3.0")
After his introductory series, Tom Fenton deploys a database on Docker and integrates it with other apps deployed from other Docker images.
Microsoft CEO Satya Nadella: "ChatGPT is coming soon to the Azure OpenAI Service, which is now generally available."
Veeam Software published a Data Protection Report for the new year, finding even more ransomware attacks plagued organizations in 2022.
Tom Fenton continues to be impressed with the low-priced Inovato Quadra, an alternative to the Raspberry Pi, and the person behind it, Michael Burmeister-Brown.
The less-expensive Quadra is a better fit than Raspberry Pi for those who want/need a low-cost software platform to use and experiment with.
"There will be more tokenization of assets, and increasingly mainstream use of blockchain technology."
After wowing the world way back in 2011 by defeating humans at the TV game show "Jeopardy!" with early-stage AI tech, IBM's Watson is making a bit of a comeback.
One of the most popular parts of Stack Overflow's huge annual developer report is an examination of what tech devs love, dread and want the most.
Davos is seen by some as the place where global elites gather annually to chart how things here on earth will work in the future.
Setting up a peering connection between VPCs in two different regions can help to simplify your disaster recovery efforts.
Tom examines different ways to store persistent data such as volume and bind mounts (or host volumes).
Research firm Gartner's "Magic Quadrant" series of reports on cloud database management systems has long seen a crowded "Leaders" field populated with the usual cast of cloud giants and wannabes, but this year AWS has slightly edged ahead of the pack.
Tom Fenton explains how networking works with containers.
"Fully 75 percent of respondents say that cloud computing represents the single greatest expansion of the enterprise attack surface in the last 20 years!"
After introducing the basics, Tom Fenton looks at the ephemeral nature of container instances and how to use networking and persistent storage with them.
A new survey-based Kubernetes backup and data protection report shows Kasten by Veeam was identified as a leader in the field, though many respondents couldn't name any organization as a leader.
Tom Fenton begins a series on how to install Docker containers on a Linux system while discussing images, performance hits and how to use network/storage with containers.
Tom Fenton looks at specs, design and build quality before discussing how well this low-priced device performs as a thin client, KVM server, Docker server and repository for edge device data.
More Tech Library