Protecting Code
We not only need to protect our systems, but the source code as well. Not for IP reasons, but for security.
2019-08-28
236 reads
We not only need to protect our systems, but the source code as well. Not for IP reasons, but for security.
2019-08-28
236 reads
2019-08-28
669 reads
It can be hard to let go of old knowledge and try something new, but we need to find a balance.
2019-08-26
174 reads
One of the things I needed to do recently was get Jenkins running as a demo for a customer. We have some pre-built VMs to do this, but I...
2019-08-26 (first published: 2019-08-14)
483 reads
Still learning more about Kubernetes. I’ve been working through the 50 days of Kubernetes (K8s). Let’s keep exploring The API is the security boundary Everything happens with the Kubernetes...
2019-08-23 (first published: 2019-08-12)
369 reads
2019-08-23
792 reads
This week Steve is wondering if you know how to use waits and queues for troubleshooting.
2019-08-23
557 reads
2019-08-22
790 reads
There is a page where GDPR fines are tracked. None of us want to get on that page.
2019-08-22
416 reads
I was working with containers recently with Jenkins. I didn’t want the server process running on my machine all the time, but I did need to allow some communication....
2019-08-21 (first published: 2019-08-07)
374 reads
By Steve Jones
A new feature added to Redgate Monitor Enterprise automatically. CIS compliance is something many...
By Steve Jones
This is my last week of the year working (I guess I come back...
By Steve Jones
suente– n. the state of being so familiar with someone that you can be...
I have listed the event names present in my system_health extended event report. Based...
A Box Contains 100Capsules Buy DNP Online, DNP (2,4-Dinitrophenol), an industrial chemical with...
I am not understanding why this command completes "successfully" and it seems correct to...
Which of these indexes is superseded by another?
See possible answers