-- Leo's gemini proxy

-- Connecting to gemini.tuxmachines.org:1965...

-- Connected

-- Sending request

-- Meta line: 20 text/gemini;lang=en-GB

Tux Machines


Red Hat Leftovers


Posted by Roy Schestowitz on Mar 30, 2023,

updated Mar 30, 2023


Today in Techrights

Android Leftovers



The developer's guide to Red Hat Summit 2023


↺ The developer's guide to Red Hat Summit 2023


> The wait is over: The session catalog and agenda builder are now available for Red Hat Summit 2023, which kicks off May 23 in Boston, Massachusetts. This year, Summit will share the stage with AnsibleFest, bringing you the latest in automation, open hybrid cloud, and more, all in one place.


↺ Red Hat Summit 2023

↺ automation


> We’re also offering a virtual option so attendees can get the most out of their 3-day conference experience. Pre-register at no cost to view keynotes and select on-site sessions to watch at your own pace after the event concludes.


> We’ve rounded up some of the highlights for developers to help you plan your agenda. Head over to the Red Hat Summit website to browse the full session catalog and register today!


↺ browse the full session catalog

↺ register today


↺ Red Hat Summit 2023

↺ automation

↺ browse the full session catalog

↺ register today



4 essentials to prevent OS command injection attacks


↺ 4 essentials to prevent OS command injection attacks


> Injection attacks, one of the most common security threats, are included in the OWASP Top 10 list of most critical web application security risks. The OWASP Top 10 is a standard for web application security that provides a comprehensive list of the most significant risks to web applications. Injection attacks occur when untrusted data is sent to an interpreter as part of a command or query. Attackers can use injection attacks to manipulate the behavior of the interpreter and gain unauthorized access to the system. Injection attacks can take many forms, including SQL injection, LDAP injection, OS command injection, etc.


↺ OWASP Top 10

↺ web application security


> OS command injection is a type of security vulnerability that arises when an application or system allows an attacker to execute operating system commands by injecting malicious input. This issue can lead to unauthorized access, data breaches, and other security issues.


↺ OWASP Top 10

↺ web application security



Deploy a Kafka Connect container using Strimzi


↺ Deploy a Kafka Connect container using Strimzi


> Kubernetes and Apache Kafka are becoming de-facto platforms for developing and deploying microservice architectures. One of the challenges you might face when using both technologies is deploying and managing Kafka brokers inside Kubernetes—dealing with YAMLs, management, container creation, etc.


↺ Kubernetes

↺ Apache Kafka

↺ microservice

↺ container


> The answer is Strimzi, an open source tool that lets you easily run Kafka clusters on Kubernetes in various deployment configurations. This article demonstrates how you can use Strimzi to configure Kafka Connect, a data integration framework for Kafka.


↺ Strimzi


↺ Kubernetes

↺ Apache Kafka

↺ microservice

↺ container

↺ Strimzi



10 must-read books written by women in tech


↺ 10 must-read books written by women in tech


> Book description (via Amazon): “The last twenty years have brought us the rise of the internet, the development of artificial intelligence, the ubiquity of once unimaginably powerful computers, and the thorough transformation of our economy and society. Through it all, Ellen Ullman lived and worked inside that rising culture of technology, and in Life in Code she tells the continuing story of the changes it wrought with a unique, expert perspective.”



Digital transformation: 5 strategies to elevate your initiative


↺ Digital transformation: 5 strategies to elevate your initiative


> For many people in your organization (probably most, in fact), these words are a foreign language, full of ambiguity and anxiety. What may be exciting to you is likely raising fear of the unknown for them, even introducing questions about competence, capability, and value.


> Fretting and fumbling in a quicksand of technical jargon is NOT how you want people to feel about your digital transformation.


> Instead, you want them to be inspired by the possibilities it can bring to the organization and even their own career growth. If you can get people excited about and inspired by your true north, you can drive real progress and change.


> Here are five strategies that can help you reveal the big picture, smooth the way, and elevate your digital transformation:


> Be clear and straightforward about why you are undertaking the transformation, including the outcomes you will deliver for customers, employees, and the business. Talk in terms of capabilities and possibilities. Your goal is to have people at every level of the organization say, “I get it. This makes sense. This is exciting. I see where I fit in. How can I help?”


↺ digital transformation




gemini.tuxmachines.org

-- Response ended

-- Page fetched on Thu Jun 13 15:58:27 2024