Machines help us learn. Machines can avoid failure, assist failures and reverse failures. One component of the “learning revolution” is the ability to employ tivo-like capabilities on events. A common end process in many organizations is the post mortem (Autopsy). Google famously studies post mortems to grow and evolve their approaches. However, what can we learn from looking at these …
Hardware Security Key – Ledger Nano S – U2F
In order to provide another layer of security, you can include a hardware key with a private key to authenticate with services like GMAIL or Github. This hardware key support storing cryptocurrencies along with its U2F (Universal 2 Factor) authentication. There are other hardware key like the Yubikey NEO which can utilize NFC and operates as a U2F but it …
Yubikey – Encryption – OTP – 2FH – Challenge-Response – Better Security – FIDO Certified
Recently, in order to take the security story further I purchased a Yubikey from http://www.yubico.com. My decision was prompted to use better security for all places that I use keys. 1. Laptop – Login to Device (Challenge-Response) 2. Access to hosting provider (VULTR) 3. SSH access to systems (VPS, AWS) 4. Move away from Google Authenticator (2FH) 5. Laptop access …
AWS Cloudformation – EC2 and Ephemeral Drives
JSON Script: https://gist.github.com/agentbond007/117e97167d2b3e0cf662cefd7b010ba3
Certification: DevOps. Continuously Deliver Better Software
Certification: Udemy Class: DevOps. Continuously Deliver Better Software
Certification: Learn DevOps Continuously Deliver Better Software
Completed Udemy Course: Learn DevOps Continuously Deliver Better Software
Certification: Introduction to Kubernetes using Docker
Completed Class: Introduction to Kubernetes using Docker
Certification: Docker and Containers. The Essentials
Completed class: Docker and Containers. The Essentials