IBM DataPower Gateway Continuous Integration With Jenkins

22 hours ago
Docker, containers, IBM DataPower. See them all come together in this video. Learn more:

How to Backdoor Invulnerable Code

1 week ago
Josh Schwartz takes a look at the real tactics, with examples, used to compromise and backdoor seemingly secure products by exploiting the humans and systems that create them. Download the slides & audio at InfoQ: This presentation was recorded at QCon London 2017. The next QCon is in San Francisco, November 13-17, 2017. Check […]

Scaling Application Defense with Intent Based Security – Michael Withrow (Twistlock)

2 weeks ago @containercamp While some have focused on trying to bend traditional security approaches to fit containers and devops, the larger security opportunity has often been missed. Containers, both the core technology and the operational patterns they enable, have some fundamental differences from traditional models. In the session, we examine the changes to the threat landscape […]

Redis Tutorial for Beginners 9 – Redis Sets

2 weeks ago
SADD key member [member …] Add one or more members to a set SCARD key Get the number of members in a set SDIFF key [key …] Subtract multiple sets SDIFFSTORE destination key [key …] Subtract multiple sets and store the resulting set in a key SINTER key [key …] Intersect multiple sets SINTERSTORE destination […]

Bare Metal Cloud – JFrog’s Baruch Sadogursky’s Perspective

2 weeks ago
Baruch Sadogursky from JFrog discusses Bare Metal Cloud — key use cases and the benefits for developers to run their applications in Bare Metal environments.

BLESS: Better Security and Ops for SSH Access

2 weeks ago
Bryan Payne talks about BLESS in general: what it is, how it works, and how we can start using it. He explores the Netflix BLESS production architecture and how other companies have used BLESS in different ways. He also talks about Netflix’s deployment and operational details, leveraging BLESS for security insight, and future plans for […]

Redis Tutorial for Beginners 8 – Redis Lists

3 weeks ago
BLPOP key [key …] timeout Remove and get the first element in a list, or block until one is available BRPOP key [key …] timeout Remove and get the last element in a list, or block until one is available BRPOPLPUSH source destination timeout Pop a value from a list, push it to another list […]

Move Workloads to the Cloud without Compromising Security with IBM Cloud

3 weeks ago
IBM Cloud Secure Virtualization uses HyTrust workload security software to protect your VMware workloads with single-tenant bare metal servers, zero-downtime encryption, decryption key management, policy based access controls, data fencing, and Intel® Trusted Execution Technology—ensuring your workloads are only deployed to trusted hardware in approved geographies and data centers around the world. Learn more:

Take Control of Compliance with IBM Cloud

3 weeks ago
Keeping up with in-house and regulatory compliance to protect sensitive data is critical to your company’s integrity. IBM Cloud Secure Virtualization validates hardware platforms using Intel Trusted Execution Technology and HyTrust workload security software for VMware workloads to ensure data location/management adheres to local, national, and regional compliance guidelines. Learn more:

Redis Tutorial for Beginners 7 – Redis Hashes

4 weeks ago
Redis Hashes are maps between string fields and string values, so they are the perfect data type to represent objects . HDEL key field [field …] Delete one or more hash fields HEXISTS key field Determine if a hash field exists HGET key field Get the value of a hash field HGETALL key Get all […]

Redis Tutorial for Beginners 6 – more commands (SETEX, SETNX, INCR, DECR, MSET…)

4 weeks ago
SETEX key seconds value Sets the value with the expiry of a key SETNX key value Sets the value of a key, only if the key does not exist SETRANGE key offset value Overwrites the part of a string at the key starting at the specified offset STRLEN key Gets the length of the value […]

Redis Tutorial for Beginners 5 – Redis strings commands

4 weeks ago
1 SET key value This command sets the value at the specified key. 2 GET key Gets the value of a key. 3 DEL key This command deletes the key, if it exists. 4 FLUSHALL Delete all the keys of all the existing databases, not just the currently selected one. 5 KEYS pattern Returns all […]