The first full work week of the year has already been filled with news. But, Monday saw a Slack outage, Wednesday saw an insurrection in the US, and there is a new twist in the Solarwinds supply chain compromise. We’ll discuss two of these topics and more.
Note: I’m looking for an intern this summer to help with OpenShift.tv (live streaming). If you know anyone that may be interested, please ask them to apply. If they have questions, feel free to send them my way: have them apply.
Linus Torvalds tears into Intel, favors AMD
After Spectre/Meltdown, I can’t blame anyone for being mad at Intel.
What Buddhism can do for AI ethics
“Buddhism teaches us to focus our energy on eliminating suffering in the world.”
Jobs report shows 140,000 jobs were lost in December. All of them were held by women
“Digging deeper into the data also reveals a shocking gender gap: Women accounted for all the job losses, losing 156,000 jobs, while men gained 16,000.”
Working from home: 30% say they would quit if forced back to office If I was working 9 to 5 in an office then was working from home and it was working well for me, I wouldn’t want to go back either.
Cybersecurity Is Not (Just) a Tech Problem
“Remote work during the pandemic has meant that organizations had to quickly ramp up their cybersecurity efforts. But securing remote work isn’t just the job of the IT team: Ultimately companies need to make security part of every job description. And the key ingredient to make that happen is trust.”
Widely Used Software Company May Be Entry Point for Huge U.S. Hacking
“Russian hackers may have piggybacked on a tool developed by JetBrains, which is based in the Czech Republic, to gain access to federal government and private sector systems in the United States.” They don’t call them Advanced Persistent Threats for no reason.
Download today: Kubernetes security ebook - tips, tricks, best practices
The rapid adoption of Kubernetes to manage containerized workloads is driving great efficiencies in application development, deployment, and scalability. However, when security becomes an afterthought, you risk diminishing the greatest gain of containerization - agility. Download this ebook to learn how to (1) build secure images and prevent untrusted/vulnerable code, (2) configure RBAC, network policies, and runtime privileges, (3) detect unauthorized runtime activity, and (4) secure your Kubernetes infrastructure components such as the API server. SPONSORED
Cyberattacks spike globally as criminals target under-pressure hospitals
“Check Point Software cybersecurity researchers say cybercrime targeting healthcare organizations has surged 45% globally since November, 25% in Israel” Attacking hospitals?!? Come on… Either the healthcare industry needs an awakening or an organization of some sort is formed to fortify it.
How Red Hat is extending Kubernetes-native security across the open hybrid cloud with StackRox
“By bringing StackRox’s powerful Kubernetes-native security capabilities to OpenShift, we are reinforcing our commitment to deliver a holistic open hybrid cloud platform. We want to enable users to build, deploy and more securely run applications across every IT footprint.” I’m excited about this latest Red Hat acquisition.
Internet traffic disruption caused by the Christmas Day bombing in Nashville
A terrifying reminder how fragile our infrastructure is.
Bad routing strikes again.
We need your voice!
In partnership with the team at ClearPath Strategies, Honeycomb.io is collecting insights for changes in software development and operation practices across our industry. How do you see the world and what your team is doing?
Take the survey for a chance to win $500 from Apple, HelloFresh, or Fender. SPONSORED
The Level Up Hour (S1E20): Kubernetes and Docker Deprecation
Langdon White, Scott McCarty, and I sit down to about the dockershim deprecation in Kubernetes.
Nvidia Releases Drivers to Fix Newly Discovered GPU Security Flaws
CVSS score of 8.4, if you’re running Nvidia, update now.
Migrating Your Open Source Builds Off Of Travis CI
“Starting in early December, a mad dash has been underway to migrate open-source projects off of Travis CI. What happened and where should you move your project to?”
Using Podman and Docker Compose
“Podman 3.0 now supports Docker Compose to orchestrate containers.”
Introduction to WebAssembly
“Get a solid foundation on the WebAssembly runtime and its capabilities, and learn how and why WebAssembly has succeeded in bringing new programming languages to the web, when others have failed.”
URGENT: SECURITY: New maintainer is probably malicious · Issue #1263 · greatsuspender/thegreatsuspender
“TLDR: The old maintainer appears to have sold the extension to parties unknown, who have malicious intent to exploit the users of this extension in advertising fraud, tracking, and more. In v7.1.8 of the extension (published to the web store but NOT to GitHub), arbitrary code was executed from a remote server, which appeared to be used to commit a variety of tracking and fraud actions. After Microsoft removed it from Edge for malware, v7.1.9 was created without this code: however, it can be added back at any time, and the original maintainer remains in control.”
Extensible platform for infrastructure management
A fast TCP/UDP tunnel over HTTP
DevOps’ish Tweet of the Week
Want more? Be sure to check out the notes from this week’s issue to see what didn’t make it to the newsletter.
Sponsor DevOps'ish and put your brand in front of thousands of highly skilled operators, maintainers, developers, and leaders from Amazon, Apple, Google, IBM, Intel, Microsoft, Red Hat, many of the Fortune 100, and beyond. Download the DevOps'ish Sponsorship Prospectus now!
Join the Conversation
Join the DevOps'ish group on Telegram for insight and in-depth discussions about real technical challenges facing real people. Also, join //devopsish for a stream of news and content throughout the week.