Jeff Reser
By: Jeff Reser

June 21, 2021 4:47 pm

3,613 views

Michael Knop
By: Michael Knop

June 17, 2021 1:17 pm

781 views

Jira as Requirements Management Tool (RMT)

Safety-critical industries can be flippantly defined as those where a software failure could kill you. Think automotive, aviation, or medical devices as examples. Safety-critical industries use heavy processes to ensure that (especially but not exclusively) software is developed in a safe manner. Heavy processes often need heavy tools. In terms of requirements management, those heavy […]

Read More


Alexander Bergmann
By: Alexander Bergmann

February 17, 2021 9:46 pm

1,362 views

SLES 15 Security Technical Implementation Guide (STIG)

We are proud to announce that DISA, the Defense Information Systems Agency, published a Technical Implementation Guide (STIG) for SUSE Linux Enterprise Server 15. A public announcement from DISA can be found here. The SLES 15 STIG can be downloaded directly from the DISA web page over here. Background: DISA is a parent agency of […]

Read More


Michael Knop
By: Michael Knop

December 17, 2020 10:39 am

13,749 views

An ASPICE Overview

Now that you're well-versed in the Waterfall Model and V-Model, it's time to take the step up into a wider world of ASPICE. I won't bore you with the details of its pedigree but ASPICE descends from a line of ISO documents concerned with setting up standards around software development. ASPICE stands for Automotive SPICE […]

Read More


Marcus Meissner
By: Marcus Meissner

December 14, 2020 7:32 am

6,099 views

SUSE statement on Amnesia:33 vulnerabilities

Researchers from Forescout research labs have published a set of new software vulnerabilities that affect embedded TCP/IP stacks. The set of vulnerabilities, called AMNESIA:33, only affects small parts of the SUSE Linux Enterprise set of packages. The Linux Kernel TCP/IP implementation is not affected by these vulnerabilities, as it uses its own IP stack. The […]

Read More


Michael Knop
By: Michael Knop

December 8, 2020 12:59 pm

4,686 views

The V-Model

Having suffered through my adoration of the venerable Waterfall Model (WM), it's time to expand upon it and bring us out of the bronze age of system development and into the age of steam with the V-Model (VM). The VM is similar to the WM in that it promotes a flow from requirements through architecture […]

Read More


Michael Knop
By: Michael Knop

November 30, 2020 12:21 pm

1,831 views

Developer Strangelove or How I Learned to Stop Worrying and Love the Waterfall Model

Everyone loves to hate the Waterfall Model (WM) and extoll the virtues of modern development methodologies. But while people are rolling their eyes at the mere mention of the WM, they forget that it was one of the first attempts at a systematic approach to complex system development. Few first attempts turn out to be […]

Read More


Brice Dekany
By: Brice Dekany

August 21, 2020 8:37 am

2,489 views

SUSE Manager and openSCAP: 200 security rules made for you

OpenSCAP is an opensource tool to test and verify security compliance against a set of rules. Did you know that SUSE provides more than 200 rules in its own SCAP Security Guide? See French version Of course there is the SLES Hardening Guide but there is a lot of other security certifications like STIG DISA, […]

Read More


Jason Phippen
By: Jason Phippen

July 8, 2020 8:16 am

3,347 views

End-to-End Retail IT Infrastructure Management: What’s new SUSE Manager for Retail 4.1

Manage, Secure, Automate and Comply with the newest version of the SUSE Infrastructure Management Solution for the Retail industry. From Mainframe and HPC Clusters to bare metal servers and VMs down to point of service terminals, kiosks, self-service and reverse-vending system Linux deployments, SUSE Manager for Retail is designed to help you reduce costs, optimize […]

Read More


Marcus Meissner
By: Marcus Meissner

June 9, 2020 4:39 pm

2,968 views

SUSE addresses Special Register Buffer Data Sampling (SRBDS) aka CrossTalk attack

Today Intel and security researchers published a number of security issues covering various Intel hardware and software components in their IPU 2020.1 release. One of those issues is a side-channel information leak attack against special registers, like the Intel CPU random register. Memory can not be read out, only previously generated random values could […]

Read More