Operations | Monitoring | ITSM | DevOps | Cloud

Linux

Container attack surface explained

Have you noticed how open-source software has become essential to innovation in the cloud-native arena? Countless cloud-native applications are powered by open source, and they are often mission-critical for organizations across industries, ranging from small startups to large enterprises. However, there are inherent security risks associated with this reliance on external components, and this problem is only growing as container adoption continues to gain momentum.

High-Performance Kubernetes Networking with Calico eBPF

Kubernetes has revolutionized cloud-native applications, but networking remains a crucial aspect of ensuring scalability, security, and performance. Default networking approaches, such as iptables-based packet filtering, often introduce performance bottlenecks due to inefficient packet processing and complex rule evaluations. This is where Calico eBPF comes into play, offering a powerful alternative that enhances networking efficiency and security at scale.

How Ubuntu Pro + Support keeps your Ubuntu 20.04 LTS secure and stable

Whether you plan to continue running Ubuntu 20.04 LTS or upgrade to the latest LTS, keeping your infrastructure secure and stable is a top priority. Extended Security Maintenance (ESM) provides essential security updates to protect your systems from vulnerabilities, ensuring you stay compliant and up to date against the latest threats.

7 considerations when building your ML architecture

As the number of organizations moving their ML projects to production is growing, the need to build reliable, scalable architecture has become a more pressing concern. According to BCG (Boston Consulting Group), only 6% of organizations are investing in upskilling their workforce in AI skills. For any organization seeking to reach AI maturity, this skills gap is likely to cause disruption.

AI in 2025: is it an agentic year?

2024 was the GenAI year. With new and more performant LLMs and a higher number of projects rolled out to production, adoption of GenAI doubled compared to the previous year (source: Gartner). In the same report, organizations answered that they are using AI in more than one part of their business, with 65% of respondents mentioning they use GenAI in one function.

Ubuntu System Logs: How to Find and Use Them

System logs play a crucial role in debugging and monitoring in Ubuntu. When a service misbehaves or an unexpected crash happens, logs hold the answers. They’re also great for keeping an eye on system performance. Knowing how to access, read, and manage these logs can save you hours of troubleshooting. This guide covers everything you need to know about Ubuntu system logs—from where they’re stored to how to analyze them efficiently.

Security in depth with Ubuntu: Mapping security primitives to attacker capabilities

Cybersecurity is not about perfection. In fact, it’s more like a game of chess: predicting your opponent’s moves and making the game unwinnable for your opponent. Like chess players, attackers are always looking for an opening, probing for weaknesses, or waiting for you to make a mistake. Therefore, the best defense isn’t a single unbreakable barrier, but instead a layered strategy that forces your adversary into a losing position at every turn.

Canonical achieves ISO 21434 certification, strengthening automotive cybersecurity standards

Canonical is proud to announce it has achieved the ISO 21434 certification for its Security Management System, following an extensive assessment by TÜV SÜD, a globally respected certification provider. This milestone highlights Canonical’s leadership in providing trusted and reliable open source solutions for the automotive sector.

Windows VPS vs. Linux VPS: which one should you choose?

When it comes to renting a virtual private server (VPS), one of the first decisions you'll face is choosing between Windows VPS and Linux VPS. Both operating systems have their pros and cons, and the right choice depends on your specific needs. So, let's consider a scenario: You've decided to rent a virtual server but are unsure which operating system is better. It's essential to take into account the technical characteristics, cost, and ease of use of each system. Let's delve into the intricacies of the choice.

Full Guide to Linux Disk IO Monitoring, Alerting and Tuning

Disk IO (Input/Output) is a core aspect of system performance. Whether you’re managing a database, a web application, or a cloud server, how efficiently your system reads and writes data affects everything from response times to stability. Unlike high CPU usage or memory bottlenecks that often manifest immediately, disk IO issues tend to creep up silently—until they slow down critical processes.