rohamilton
By: rohamilton

August 8, 2019 6:27 pm

920 views

A Blunt Reminder About Security for Embedded Computing

  Recent news of the VxWorks security breach raises the unsettling question that those of us in the embedded computing industry have grappled with for decades. How do we secure an embedded operating system from a nefarious attack? The ICS Advisory (ICSA-19-211-01) released on July 30th by the Cybersecurity and Infrastructure Security Agency (CISA) […]

Read More


John S. Tonello
By: John S. Tonello

August 7, 2019 6:57 pm

819 views

Technical Overview: Storage Redefined

Getting up to speed on new technology -- and staying there -- is the challenge facing anyone working in technology these days, and the world of storage is no different. With hybrid cloud solutions that stretch resources from your data center to the public cloud and back again, it can be a challenge to stay […]

Read More


Rania Mohamed
By: Rania Mohamed

July 31, 2019 10:14 am

1,002 views

Cloud Native Applications in AWS supporting Hybrid Cloud – Part 2

In my previous post , I wrote about using SUSE Cloud Application Platform on AWS for cloud native application delivery. In this follow-up, I’ll discuss two ways to get SUSE Cloud Application Platform installed on AWS and configure the service broker: Use the AWS Quick Start for SUSE Cloud Application Platform on Amazon EKS to […]

Read More


Rania Mohamed
By: Rania Mohamed

July 31, 2019 10:14 am

896 views

BJM
By: BJM

July 9, 2019 10:16 pm

722 views

Embedded System Development for IoT: Three-Part Series

The landscape of embedded systems and computing is changing. Fast. IoT in particular is driving widespread change in technology when it comes to standards, hardware, systems, and software, with the need for all of these components to work seamlessly as a complete infrastructure. Meanwhile, the demand for increased functionality at the edge has underscored the […]

Read More


berndschubert
By: berndschubert

April 15, 2019 7:23 pm

1,476 views

How to tweak your SAP S/4 HANA – Enqueue Replication 2 High Availability Setup – Part 1

How to tweak your SAP S/4 HANA – Enqueue Replication 2 HA Setup This blog will describe how you can tweak the Enqueue Replication 2 High Availability setup, and how you can benefit from of the new feature of Enqueue Replication 2 technology. Up to now our SAP NetWeaver HA-CLU certification has been based on […]

Read More


Lawrence Kearney
By: Lawrence Kearney

November 27, 2018 2:06 am

1,415 views

Deploying SLURM PAM modules on SLE compute nodes

Security in High Performance Computing (HPC) environments has always been a proposal of relativity. Striking a balance between implementing an adequate level of security and not interfering with “getting the science done”. In the simplest terms the primary security realms HPC systems and clusters are exposed to are environmental and user facing. More specifically […]

Read More


Jason Phippen
By: Jason Phippen

August 28, 2018 1:54 pm

2,583 views

SUSE Manager Technical Overview-Part 2 How SUSE Manager Works

In this 3 part blog series we take a deeper look into SUSE Manager 3.2, looking at what the product does, how it does and how it is set up. Blog Part 1 - Discover SUSE Manager Blog Part 2 - How SUSE Manager Works Blog Part 3 - SUSE Manager Configuration Management &[…]

Read More


Lawrence Kearney
By: Lawrence Kearney

June 17, 2018 2:20 am

13,157 views

The SSSD, Active Directory, and growing SLES integration

From both feature and security perspectives, integrating Linux systems with Active Directory environments has been a challenge for their respective system administrators and organisations. However, modern Linux distributions include the System Security Services Daemon (SSSD) which addresses many of the legacy shortcomings handily. The daemon uses identity and authentication providers (and other service providers) to […]

Read More


Lawrence Kearney
By: Lawrence Kearney

June 14, 2018 2:37 am

2,784 views

SLES, PAM, SSSD, and MFA Soup

Multi-factor authentication (MFA) solutions are becoming the standard for many user facing IT services. Most visibly with web applications, corporate VPNs, self-service portals and online banking platforms to name but a few. Extending MFA to the realm of system administration to harden access to the Linux operating system itself is becoming an established best practice […]

Read More