Finding applications vulnerable to CVE-2023-4863 (WebP)
Last week Google announced a buffer overlflow vulnerability in the WebP media format that impacts both browsers and e...
Last week Google announced a buffer overlflow vulnerability in the WebP media format that impacts both browsers and e...
I recently attended KubeCon + CloudNativeCan North America 2019 in San Diego. The four-day conference was filled with...
Persistent Volume Options for K8s Storage Kubernetes was originally developed as a platform for stateless applicatio...
For years, IT infrastructure provisioning was a manual process. This made sense when deploying a new server meant pl...
Backups and Disaster Recovery: What’s the Difference? Modern IT departments need to be able to protect their mission...
Kubernetes (k8s) is quickly becoming the de facto standard for container orchestration because it provides an effecti...
The Business Case for Turnkey Infrastructure as a Service Just about everyone in IT has used VMware’s vSphere to bui...
Choosing the Right Cloud Migration Strategy There are several different ways to migrate workloads to the cloud. As w...