Escaping the Whale: Things You Probably Shouldn’t Do With Docker (part 2)

Escaping the Whale: Things You Probably Shouldn’t Do With Docker (part 2)

This post is part 2 of a series of blog posts on container hacking. If you haven’t read the part1, you should check it out. Today I’m going to tell you about ...
High Sierra could not turn on FileVault

High Sierra and FileVault® Compatibility Issues

Many IT admins have been faced with a barrage of issues with managing Mac® users and systems as they have been upgrading their macOS® systems to High Sierra. One such issue is ...
cloud security

Cloud Security Myth vs. Fact #2: Is Encryption the Best Security for Data at Risk?

| | Cloud Security
Whenever there’s a major data breach one of the first things everyone asks is, “Was the data encrypted?” This is a very natural question to ask because since the 1970s encryption has ...
AWS<sup>®</sup> Cloud Directory vs. OpenLDAP™

AWS® Cloud Directory vs. OpenLDAP™

As IT organizations shift a great deal of their infrastructure to the cloud, a question that we are often hearing is focused on cloud directory services. Specifically, IT organizations are wondering if ...
IDaaS and the HIPAA Security Rule

IDaaS and the HIPAA Security Rule

The changing landscape of IT is giving organizations new opportunities to address compliance. One area to consider is IDaaS and the HIPAA Security Rule. The core of any compliance initiative is controlling ...
self-service password resets

G Suite™ Self-Service Password Resets

G Suite™ is one of the most popular productivity solutions for business users. Originally going by the name Google Apps, it arrived on the scene roughly a decade ago. It was brought ...
cloud

Am I Already Using the Cloud and is it Safe?

Often when speaking to people about the cloud, their first reaction is that it isn’t safe and they won’t use it. Odds are that they, and most everyone else who owns an ...
mac system management

Identity Management Capability Mac® System Management

Now more than ever, the IT market is fluctuating in a state of change. The source of that change is a seismic shift from on-prem, legacy solutions to the cloud and new ...

Multi-Cloud Security Best Practices Guide

A multi-cloud network is a cloud network that consists of more than one cloud services provider. A straightforward type of multi-cloud network involves multiple infrastructure as a service (IaaS) vendors. For example, ...
🔗

Connecting Apache Zeppelin Up to Amazon Athena with an IAM Profile Name

| | athena, aws, zeppelin
Apache Zeppelin is a “notebook” alternative to Jupyter (and other) notebooks. It supports a plethora of kernels/interpreters and can do a ton of things that this post isn’t going to discuss (perhaps ...
Loading...