Virtualization, containers, and k8s

External Article

Securing the DevOps Pipeline Part 2: Hardening Kubernetes and Cloud Security

  • Article

In Part 2, we shift our focus to securing containerized deployments and cloud infrastructure. We will cover Kubernetes security hardening, real-time monitoring, infrastructure as code (IaC) security, and shifting security left to catch misconfigurations early. These strategies will help your team secure workloads in production and respond to potential threats before they lead to a security breach.

2025-05-19

SQLServerCentral Article

Using Containers to Avoid Installing SQL Server

  • Article

I got a new laptop recently and instead of installing SQL Server, I decided to try and use containers to see how well this works. This article looks at how I got this working relatively quickly. The short list of things I did is: Install Docker Desktop Create a location for data/logs/etc. Create a docker-compose […]

(2)

You rated this post out of 5. Change rating

2024-09-06

6,597 reads

Blogs

Finding Balance: Things Will Come Up

By

I have a presentation on finding balance in your career that got quite a...

Who Are You Doing It For?

By

But as I've matured over the years, I came to realize that I needed...

Presenting Twice in May 2026

By

I will be presenting my latest session, Documenting Your Work for Worry-Free Vacations, in-person...

Read the latest Blogs

Forums

Radius Latitude Longitude

By HeftSteady

I have a table with latitude longitude in the format.  45.123456 , -111.123456 ,...

degree of parallelism

By Davekahn

Team, I'm trying to figure out what will be the best recommendation to configure...

A Fun Computer Quote

By Steve Jones - SSC Editor

Comments posted to this topic are about the item A Fun Computer Quote

Visit the forum

Question of the Day

A Fun Computer Quote

Which movie featured this quote?

"All programs have a desire to be useful."
Happy April Fools!

See possible answers