How-tos
Stop the Low-Quality Contribution Plague
I was in a discussion thread with folks from Cloud Native Computing Foundation and Kubernetes today, and this phrase came up again. The context was something along the lines of… “we’re afraid ...
New and Expanded Free Sonatype Learning Resources
Sonatype Learn resources build and improve user’s expertise on Sonatype tools. We’re expanding our onboarding tools for new users and adding new interactive courses to go along with our own advice column ...
How to Use Nexus Repository with Maven Deploy [VIDEO]
Most of the time it is fairly difficult for a junior developer to make sense out of things happening behind the scenes. This happened in one of my interactions with a junior ...
Sonatype Nexus Repository 3.20 Installation, Admin Login, and Port Change [VIDEO]
There are often times in agile teams where DevOps is constrained by bandwidth. This tutorial is aimed at developers to help them get things up and running without hassle. This will give ...
Managing Nexus API Using Jenkins X
In my last post, Jenkins X — Managing Jenkins, I talked about how we manage our Jenkins server. This time around, I’ll be looking at the Nexus server and how it too ...
Kubernetes in 10 Seconds
Sonatype’s DJ Schleen (@djschleen) demonstrates Kubernetes in 10 seconds: ...
Top 5 Tomcat Vulnerabilities
Those who spend time monitoring and patching open source projects will be quite aware that Tomcat has some vulnerabilities ...

How to block ads like a pro
In part one of this series, we had a look at a few reasons why you should block ads on your network and devices. In the second part, we’ll cover a few ...

So you’ve been asked to start a threat intel program
What are the bumps in the road you can expect and avoid when setting up a threat intel progarm for your business? Categories: Business How-tos Tags: remediationThreat Intel (Read more...) The post ...