Amazon! Why? Security by Obscurity – AWS4 authentication method.
We look into how to sign a request against the "new" Amazon data centers. All centers deployed after 2014 need to use the new ...
We are in our new linux environment and create coreutils, python, ninja and meson. Talking about their usages and the importance of the utils in the core of linux.
We look at using XML transforms and testing the result using XSpec
We solve the day 8 challenges for the Advent of Code.
I look into the Ceph Rook orchestrator that is the pre-cursor to the Ceph admin tooling. This installtion uses an Kubernetes installation in order to deploy a cluster and scale it up and down. Sadly the Ceph GUI don’t have much control so all changes are done with Kubernetes manifests from the command line.
We are in our new linux environment and create gettext and OpenSSL, talking about internationallization and website security.
We go through the latest features of Java and what to expect in marsh.