Closing the Cybersecurity Skills Gap with Programs for Veterans

People have been talking about the cybersecurity skills gap for almost as long as they have been talking about the rise in data breaches. It’s easy to get “gap” fatigue and ignore the problem, but the facts warn against that approach. The 2018 (ISC)2 Cybersecurity Workforce Study reports that the Continue Reading

Speed up your ROS snap builds

A while back I wrote a post about distributing a ROS system among multiple snaps. If you want to enable some sort of add-on story, you need to have multiple snaps, and that remains the way to do it today with ROS. That approach works, but I’ll be the first Continue Reading

Remote WordPress Management Arrives With WordPress Toolkit 4.0 [ VIDEO ]

You’re about to experience a fundamental change to the world of WordPress Toolkit: the ability to manage remote WordPress sites. This feature is Remote WordPress Management – publicly available as part of the WordPress Toolkit 4.0 release. Let’s dive into the details so you can install it on your server Continue Reading

11 Security Add-ons You Should Offer to Boost Your Hosting Revenue

Previously, Plesk CTO Jan Loeffler, talked about changes in the hosting market. And suggests hosters offer a custom, hyper-tailored security solution – at a higher price. This includes services like automated malware removal, antivirus, web application firewall, and anti-DDOS in existing hosting plans. But why does it pay to do Continue Reading

Group Replication – Consistent Reads Deep Dive

On previous posts about Group Replication consistency we: introduced consistency levels; explained how to configure the primary failover consistency; presented how to configure transaction consistency levels to achieve the consistency required by your applications. In blog 3. we presented the consistency levels: EVENTUAL, BEFORE, AFTER and BEFORE_AND_AFTER; their scopes: SESSION, Continue Reading

CentOS News

Using buildah to build container images on CentOS – Blog.CentOS.org

In this post, we’re going to talk about how to use buildah to build container images on CentOS. buildah is a command line tool that facilitates building OCI compliant images. There’s a plethora of information available around what buildah is on its GitHub landing page so we won’t dive more Continue Reading

Where eagles snap – A closer look

A couple of weeks ago, we talked about snap security, taking a journey through the eyes of a developer and handing over to a user who wants to install applications from the Snap Store. We discussed concepts like application confinement, interfaces, store review, and automatic updates. Today, we will look Continue Reading

Prevent Leaks of Sensitive Business Data with Security Gateway

Businesses of all types must maintain records containing personal information about their employees and customers, and executives and clients alike have a mutual interest in protecting that data. But there’s no guarantee that every employee will treat confidential account numbers, Social Security numbers, passport numbers or other personal data with Continue Reading

3CX Call Flow Designer. What’s in store for V16

3CX v16 is around the corner, and we have some exciting news to share about our Call Flow Designer. With this new release, the CFD will use a new scripting engine with deeper integration into 3CX. Furthermore, it is much more efficient as the script execution engine forms part of Continue Reading

Zero to Snap – Rev up your packaging

Software developers often have enough to worry about. Their focus is creating the best application they can, often without having to consider packaging. We recently discovered Akira, which illustrates this well. The small team of developers are hard at work on the application, so software packaging isn’t a high priority Continue Reading

>