What's Your IT Question?

Want to know more about this topic or about us? Contact us!

All posts in Open Source

How to Compare the Contents of Local & Remote Files With the Help of SSH

This is a step-by-step guide on how to compare the contents of local and remote files with the help of SSH. Watch the companion video tutorial by Jack Wallen. [embedded content] Have you ever needed to compare the contents of a local and remote file without having to copy the . . . Read more

Intel Innovation 2023: Attestation and Fully Homomorphic Encryption Coming to Intel Cloud Services

The attestation service is designed to allow data in confidential computing environments to interact with AI safely, as well as provide policy enforcements and audits. Image: JHVEPhoto/Adobe Stock The second day of announcements at Intel’s Innovation event in San Jose, California focused on privacy and security, including confidential AI. Major . . . Read more

How to Connect Grafana to a Remote MySQL Database

Grafana needs data to be useful. Jack Wallen walks you through the process of using a MySQL database as a source for data visualization in Grafana. Grafana is one of the most widely-used interactive data visualization tools on the market. It’s open-source, powerful, highly configurable and free to use. I’ve . . . Read more

How to Create and Use a Docker Secret From a File (+Video)

In this step-by-step tutorial, learn how to create and use a Docker secret to help keep your data secure. [embedded content] Secrets are a very important part of deploying containers and services because they encrypt passwords, API keys, certificates and other information you need to keep private within the container. . . . Read more

CISA Aims For More Robust Open Source Software Security for Government and Critical Infrastructure

The agency’s roadmap outlines a plan for prioritizing where open source software makes infrastructure potentially vulnerable. The US Cybersecurity and Infrastructure Security Agency released four priorities for securing open source software ecosystems on Tuesday, September 12. Specifically, the roadmap will be used to develop a framework to prioritize risk. This . . . Read more

8 Best Network Monitoring Tools for 2023

If you combine enterprise network monitoring tools with industry best practices for network management, you’ll gain fuller visibility over your assets and establish a healthier network environment. Depending on your company’s security requirements and levels of risk, you can get advanced network monitoring features or just the basics with our . . . Read more

UK’s NCSC Warns Against Cybersecurity Attacks on AI

The National Cyber Security Centre provides details on prompt injection and data poisoning attacks so organizations using machine-learning models can mitigate the risks. Image: Michael Traitov/Adobe Stock Large language models used in artificial intelligence, such as ChatGPT or Google Bard, are prone to different cybersecurity attacks, in particular prompt injection . . . Read more

GitLab’s Lemos: AI, Automation are Key to DevSecOps

Image: Monticellllo/Adobe Stock GitLab, like its competitor GitHub, was born of the open source Git project and is still an open-core company (i.e., a company that commercializes open-source software that anyone can contribute to). It has, since its 2011 launch as an open-source code-sharing platform, seen its DevOps software package . . . Read more

Google Cloud Next ‘23: New Generative AI-Powered Services

Image: Sundry Photography/Adobe Stock Google unveiled a wide array of new generative AI-powered services at its Google Cloud Next 2023 conference in San Francisco on August 29. At the pre-briefing, we got an early look at Google’s new Cloud TPU, A4 virtual machines powered by NVIDIA H100 GPUs and more. . . . Read more