article thumbnail

How to secure your open source supply chain

Tech Republic Security

Commentary: Open source has never been more popular, which means it's time to figure out how to effectively secure the open source you use. Two experts weigh in.

article thumbnail

The Audacity! How to wreck an open-source project and anger a community

Tech Republic Security

Audacity software has been acquired, and the new verbiage added to the privacy policy has the open-source community up in arms.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to connect a client to the open-source Pritunl VPN

Tech Republic Security

Now that you have your Pritunl VPN server up and running, Jack Wallen shows you how to connect the client.

article thumbnail

How to install and use the open source OTPClient 2FA tool on Linux

Tech Republic Security

If your desktop of choice is Linux, you don't have to be without a 2FA tool, thanks to OTPClient.

Linux 540
article thumbnail

An Architect’s Guide for Selecting Scalable, Data-Layer Technologies

That’s why we developed this white paper to give you insights into four key open-source technologies – Apache Cassandra®, Apache Kafka®, Apache Spark™, and OpenSearch® – and how to leverage them for lasting success.

article thumbnail

How to achieve persistent SSH connections with the open source MOSH

Tech Republic Security

Jack Wallen shows you how to install and use this handy tool. MOSH makes it possible for SSH connection to persist, even as you roam from one network to another.

article thumbnail

Cybersecurity: Increase your protection by using the open-source tool YARA

Tech Republic Security

Here's how to install it on Mac, Windows and Linux. This won't replace antivirus software, but it can help you detect problems much more efficiently and allows more customization.

article thumbnail

Open Source & Open Standards: Navigating the Intricacies of a Symbiotic Partnership

Speaker: Guy Martin, Executive Director of OASIS Open

Something all of these technologies have in common is that they are open standards with robust open-source implementations. In the early days of technology, the building blocks of strong open standards combined with open source code that implemented these standards set the stage for breakthrough innovations.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value.

article thumbnail

Ultimate Guide to the Cloud Data Lake Engine

This guide describes how to evaluate cloud data lake engine offerings based on their ability to deliver on their promise of improving performance, data accessibility, and operational efficiency as compared with earlier methods of querying the data lake. How to get started with your evaluation