Navigation Menu

A Concise Introduction to DevSecOps

By on Feb 17, 2019 in Article

Why Should I Care About DevSecOps? Are you a frustrated security professional, trying to get your organization to change (aren’t we all)? Or perhaps, you are trying to get management to value security more? Or maybe, you are a security conscious Developer (wait, do those actually exist? Yes, yes, they do) or Sysadmin who knows you need more security in your...

Read More

Hacker’s Guide to Installing OpenShift Container Platform 3.11

By on Dec 5, 2018 in Article

Background My problem, like most technologists, is that I only have a slice of my time to dedicate toward acquiring and maintaining knowledge about any given technology, product, project, tool, platform, etc. Split that with the fact that almost every CIO is preaching that we, as technologists, need to be closer to the business, and our time gets even thinner. This...

Read More

A Comparison of Linux Container Images

By on Aug 18, 2017 in Article

  Background Going back to basics, there are two major parts of an operating system – the kernel and the user space. The kernel is a special program executed directly on the hardware or virtual machine – it controls access to resources and schedules process. The other major part is the user space – this is the set of files, including...

Read More

How I Got the Name Fatherlinux :-)

By on Sep 3, 2016 in News

Over the years I have realized that there is a bit of confusion when I first tell people my Twitter handle is @fatherlinux. People ask things like, “what about mother Linux?” or “Perhaps you should change your name to Grandpa Linux now that you have been doing this for so long?” They often think the name is related to some self perception of...

Read More

Core Builds in the Age of Service

By on Dec 3, 2014 in Article

Background As legacy applications are redesigned for the cloud, they are converted to run in a stateless manner. In newly designed applications, data flows between application code, messaging infrastructure, caches and databases seamlessly even during individual node failures of any one subsystem. When an active node fails, a new one is instantiated and placed back...

Read More