Do You Talk About Things Like…
DevSecOps, AI/ML Ops, cloud automation, IaC, CI/CD, pet-grooming for developers, SOAR, Kubernetes, Salt Project, making the perfect whiskey sour, cybersecurity automation, and software engineering?
Yes. And a whole lot more.
Sort By
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- September 2022
- August 2022
- April 2022
- March 2022
- November 2021
- April 2021
- August 2020
- June 2020
- May 2020
- January 2020
- November 2019
- September 2019
- August 2019
- May 2019
- January 2019
Salt vs Grlx: The Battle of Automation Is Getting Spicy
Author: Keisha Thomas-Gamble
In the ever-evolving world of DevOps, choosing the perfect blend of tools for automating infrastructure and application management is crucial, but also a daunting task. Today, we'll pit two contenders against each other: the up-and-coming Grlx and the established player, Salt.
Grlx: DevOps Gets Another Flavorful Approach
Author: Keisha Thomas-Gamble
Grlx (pronounced "garlic") dubbed as a fleet configuration management system, brings a new aroma to the world of automation, crafted entirely in Go. This flavorful tool aims to automate system management tasks across designated nodes, aptly referred to as "Sprouts," ensuring these nodes maintain a harmonious state as defined by their "Recipes."
Simplifying EKS Cluster Management with Slack Notifications
Author: Meghann Cunningham
In today's cloud-native landscape, managing Kubernetes clusters efficiently is paramount for ensuring smooth operations. Amazon Elastic Kubernetes Service (EKS) simplifies Kubernetes management on AWS, but staying on top of updates and changes can be challenging. In this blog post, we'll introduce a handy tool that automates the process of checking EKS cluster add-ons for updates and sends notifications directly to Slack, keeping your team informed and your cluster up to date.
Leveraging Threat Intelligence Databases
Are you taking advantage of the powerful data available in threat intelligence databases as part of your overall defense strategy? If not, read on to find out how they can help keep you ahead of bad actors.
Things I Wish I Knew Before I Started WFH
Author: Keisha Gamble
It brings wonderful images of sweatpants and fuzzy slippers, rolling out of bed and immediately being in the "office" without having to worry about what you are going to wear and packing lunches. Today, we have seen a multitude of stressors that have forced us to reshape the way we think and approach our day to day. As work-life balance and safety concerns are at the forefront of everyone's minds (rightfully so), telework opportunities have gone up, but in its wake is an undertone that is just now reaching the surface.
Navigating the Broadcom-VMware Shake-Up: What You Need to Know
Author: Meghann Cunningham
In a seismic shift in the IT industry, Broadcom's acquisition of VMware has triggered a wave of transformations in its partner programs, leaving countless customers and service providers seeking clarity and alternatives.
Switching Gears: My Rewarding Journey from Network Security to DevOps
Author: Jonathan Gordon
Venturing from Network Security to DevOps, my career shift was more than just a change in job titles. Join me as I reflect on the challenges and learnings that shaped this rewarding journey, blending security expertise with the dynamic world of DevOps.
Exploring the Fluidity of FlowPipe
Author: Nicholas M. Hughes
Recently, I stumbled upon a fascinating tool that's been buzzing in the developer community: Flowpipe (flowpipe.io). This innovative platform caught my attention as a unique way to script complex workflows, especially for those who are familiar with Terraform but might not be hardcore coders.
Efficient Power Management in AWS
Author: Nicholas M. Hughes
Efficient power management in AWS is crucial for optimizing performance and cost-effectiveness. But what does that look like, exactly? We’re glad you asked…
Undocumented Features: Salt Runner Silence
Author: Nicholas M. Hughes
The second installment in the “Undocumented Features” series... Discovering hidden gems in Salt Project’s code base: A quiet triumph.
Automating Threat Intelligence: A Strategic Approach to Data Movement
Author: Nicholas M. Hughes
Want to strengthen your cybersecurity defenses? It's time to harness the full potential of your data through a data-centric approach in threat intelligence.
Web Retriever: The New Hero in your Cybersecurity Arsenal
Author: Nicholas M. Hughes
In the realm of cybersecurity and technology, where the Internet is both the battlefield and the prize, a new champion has emerged from the shadows of security automation tools. Meet Web Retriever, an open-source API from Hopr and EITR, that acts as a guardian of the gateway between machine workloads and the vast, chaotic realms of the Internet.
Unlocking Efficiency: 10 Automation Projects to Transform Your Operations
Author: Nicholas M. Hughes
Does your organization need to do more with less? Who doesn’t? IT budgets are facing cuts and staffing levels are often lower than many industry professionals believe is necessary to fulfill their mission. So what can you do to get the job done with fewer people and less money? Automate All the Things.
Bridging the Cybersecurity Skills Gap: The Untapped Potential of Upskilling
Author: Nicholas M. Hughes
In the bustling realm of cybersecurity, a peculiar paradox has emerged. On one side of the chasm, there's a palpable shortage of seasoned professionals; on the other, a brigade of eager novices is ready to dive into the digital trenches, albeit sans experience.
Education in the Age of AI
Author: Natalie Lee
Will ChatGPT destroy educational integrity – or revolutionize the way we learn? A college student's take on the future of education.
Video: Code Writeability - Over or Under Rated
When it comes to code, which rules supreme: simplicity or flexibility?
Welcome back to Rated, where we dissect whether technology, tech platforms, or software tools are overrated or underrated. This week, we're diving into the realm of code readability. Join us as our CEO Nicholas Hughes and Go expert Jonathan Hall enter the ring!🥊
ChatGPT and Cybersecurity: Is the Popular AI a Threat?
Author: Nicholas M. Hughes
Yes, ChatGPT is a valuable tool. But is your team using it responsibly? Here’s what you need to know to harness its power without compromising security.
Video: How Will AI Influence Recruiting and HR?
How can we harness AI for the mutual benefit of job candidates and recruiters?
In the most recent episode of the EITR podcast, we sat down with expert recruiter Ross Hecox from @scuttlegov8213 , delving into the realm of artificial intelligence's role in Human Resources.
Video: Trunk-Based Development - Over or Under Rated
Is trunk-based development a risk or a game-changer?
Welcome back to Rated, where we argue whether a given piece of technology, tech platform, or software tool is overrated or underrated.
7 Reasons We're Head Over Heels for Salt Project
Author: Nicholas M. Hughes
How do we love Salt Project? Let us count thy ways…