ADMIN PreviewIssue 39: Container Security |
|
Welcome to ADMIN Magazine Preview. This newsletter is a special reminder for all ADMIN Update readers to let you know the latest issue of ADMIN Magazine is making its way to your newsstand. If you have a digital subscription, you can download the latest issue today. If you don't subscribe to ADMIN magazine, you can still download ADMIN articles on demand. See below for a summary of the articles in the latest issue. And of course, if you're sure you don't want to receive this preview, click the link below to unsubscribe. Edit your profile and deselect the ADMIN Preview option. Issue #39 will be shipped to subscribers and available on newsstands starting approximately:
UK/Europe: June 26
|
|
|||
* Google Play Newsstand available in AUS, CA, FR, DE, IT, UK, USA |
In this issue: |
Welcome: Of Earthworms and System AdministratorsI'm fascinated by the stories of disasters and near disasters related to me by my IT peers, especially those involving backups – or the lack of backups, as is so often the case. (more)On the DVD: ClearOS 7 Community Edition and Kali LinuxClearOS provides a simple and easy-to-use platform for all layers of the IT environment. Offensive Security bills Kali Linux 2017.1 as their “mostadvanced penetration testing distribution, ever”. (more) Tech News: News for adminsNews for system administrators around the world. (more)ContainerCon: The view from DockerCon 2017Docker unveiled some exciting new initiatives at their annual event, including a new program for containerizing legacy applications. (more)Fortress in the Clouds: Harden your OpenStack configurationAny OpenStack installation that hosts services and VMs for several customers poses a challenge for the security-conscious admin. Hardening the overall system can turn the porous walls into a fortress – but you'll need more than a little mortar. (more)The Crux with Leaks: Security issues when dealing with Docker imagesAlthough developers appreciate Docker's ease of use and flexibility, many admins are worried about vulnerabilities. We look at various approaches to securing container images and the price to be paid. (more)Active Separation: Avoiding KVM configuration errorsVirtualization solutions isolate their VM systems far more effectively than a container host isolates its guests. However, implementation weaknesses in the hypervisor and configuration errors can lead to residual risk, as we show, using KVM as an example. (more)Designer Store: Software-defined storage with LizardFSStandard hardware plus LizardFS equals a resilient, flexible, and configurable POSIX-compliant storage pool. (more)Switch Keeper: Understanding the Spanning Tree protocol familySeveral versions of the venerable Spanning Tree protocol have appeared through the years. We'll help you sort through the acronyms and show you which version is right for your network. (more)Launched: Configuration management and automationAs automation of IT landscapes continues, a plethora of new tools reach the market to help admins with this task. Rundeck offers a web-based GUI and job delegation. (more)Plug and Play: Managing Vim pluginsWe look at some tools that can help take the pain out of managing plugins. (more)Up To Date: Modern Fortran for today and tomorrowFortran development is still progressing, with a new version scheduled for release in 2018. We look at Fortran's evolution into a modern language for HPC. (more)Build, Build, Build: Deploying OpenStack in the cloud and the data centerCanonical's Juju, MAAS, and Autopilot deliver practical experience in setting up an OpenStack environment in Ubuntu. (more)Motor for the Cloud: VMware vRealize Automation 7We look at VMware's tool for managing and provisioning cloud infrastructures. (more)Identity Transfer: Sync identities with Microsoft Identity ManagerLearn how Microsoft Identity Manager 2016 can help sync identities in the local AD as well as Azure AD and Office 365. (more)Building Bridges: NetworkManager at the command lineA variety of approaches are available for customizing the network on modern Linux systems. Here, we focus on the NetworkManager tool. (more)Do It Yourself: MySQL is gearing up with its own high-availability Group Replication solutionOracle recently introduced Group Replication as a trouble-free high-availability solution for the ubiquitous MySQL. (more)Shippable Data: Relational databases as containersIf you spend very much of your time pushing containerized services from server to server, you might be asking yourself: Why not databases, as well? We describe the status quo for RDBMS containers. (more)Useful Tool: Working with objects in PowerShellThis workshop helps admins understand the object-oriented structure of PowerShell. (more)Micro Net: Microsegmentation with VMware NSX and vRealize AutomationVMware's NSX for vSphere platform adds security to microsegmentation, allowing security components to analyze traffic within the hypervisor. (more) |
Email not displaying correctly? View it in your browser. Visit our Website: ADMIN © 2017 by Linux New Media USA, LLC Change your email address / update your profile. Unsubscribe from ADMIN Preview. If you want to unsubscribe from all our ADMIN newsletters please click here. |