View Post

AWS Dedicated – Reducing Noisy Neighbors and More

It’s pretty interesting to see the back and forth as folks discuss the merits of cloud over bare-metal, and vice versa. Something signaled a real nod to the value of bare-metal as a valuable asset in the cloud was the recent announcement that AWS will be offering dedicated EC2 hosts. If AWS is the be-all end-all as some may say, …

View Post

Thinking Like the Bad Actors and Prioritizing Security

Assume you’ve been breached. Period. The reason that I start there is because I’ve learned from practice, that we have to work on the assumption that we have had our systems violated in one way or another. The reason that this is important is that we have to start with a mindset to both discover the violation, and prevent it …

View Post

What’s the Deal with Docker? ┬áSome Stats from Datadog on Docker Adoption

There’s a running joke where every tweet “needs more #docker”. It’s because of the nearly meteoric rise in popularity of the idea of containers as triggered by the Docker contains format. As some may know, Docker came from dotCloud and was a containerization technology to enable them to work on a PaaS infrastructure. Much like the accidental discovery of products …

View Post

Adding Yourself to Your Own Twitter Lists

This may seem like a rather simple task, but apparently it is one that the team at Twitter in charge of the web UI decided wasn’t needed. I was creating a Twitter list for the #vDM30in30 group and realized that I was unable to add myself to the list. Huh?! First, let’s start with why a Twitter list is helpful: …