Nicolás Georger
Self-taught IT professional driving innovation & social impact with cybernetics, open source (Linux, Kubernetes), AI & ML. Building a thriving SRE/DevOps community at SREDevOps.org. I specialize in simplifying solutions through cloud native technologies and DevOps practices.
Vamos ver quais são as diferenças chave entre um Site Reliability Engineer (SRE) e um Administrador de Sistemas (SysAdmin) "tradicional", destacando como a "filosofia" SRE, impulsionada pela automação, monitoramento e uma colaboração próxima com os desenvolvedores, leva a uma maior confiança nos sistemas e um ciclo
Read the full post →
Veamos cuáles son las diferencias clave entre un Site Reliability Engineer (SRE) y un Administrador de Sistemas (SysAdmin) "tradicional" destacando cómo la "filosofía" SRE, impulsada por la automatización, la monitorización y una estrecha colaboración con los desarrolladores, conduce a una mayor confianza en los sistemas y
Read the full post →
macOS users have several solid options for running containers, each with its own strengths. We review OrbStack, Lima (Linux Machines), and Docker Desktop, comparing their features, performance, and ease of use to help you choose the best fit for your development workflow. Whether you're a seasoned Kubernetes veteran
Read the full post →
TL;DR
Tired of your Kubernetes volumes disappearing like your last vacation? 😩Longhorn 1.6 is here to save your data (and your sanity)! This bad boy brings persistent volumes to your Kubernetes cluster, making sure your apps stay fed with data, no matter what chaos the internet throws at
Read the full post →
ParadeDB is shaking things up in the world of search and analytics by offering a compelling Postgres-based alternative to Elasticsearch. This article dives into ParadeDB's features, how it stacks up against Elasticsearch, and why you should keep an eye on this emerging technology.
ParadeDB: Riding the Postgres Wave
Read the full post →
Lemony presents a generative AI on premises solution designed for businesses, organizations and individuals concerned about data security, privacy, and control. Lemony offers a compelling alternative to cloud-based AI by keeping all data within an organization's network, ensuring compliance and peace of mind. We'll delve into
Read the full post →
TL;DR: Flying blind in your Kubernetes environment? Fight challenges of Kubernetes network observability with Kubeshark as the predator of network monitoring. Learn how this powerful tool provides real-time, protocol-level insights into your K8s cluster's API traffic, making troubleshooting a breeze and security nightmares a distant memory.
Kubeshark:
Read the full post →
TL;DR
One of the key points of RISC-V is its open and free architecture. If we have evolved exponentially with open source, RISC-V bodes well. The open source RISC-V architecture is generating great interest, promising a new era of free and open hardware. We review the potential of RISC-V,
Read the full post →
TL;DR
Uno de los puntos claves de RISC-V es su arquitectura abierta y libre. Si con el opensource hemos evolucionado exponencialmente, RISC-V tiene buenos augurios. La arquitectura open source RISC-V está causando profundo interés, prometiendo una nueva era de hardware libre y abierto. Revisamos el potencial de RISC-V, su
Read the full post →
TL/DR;
¿Cansado de revisar manualmente tu clúster de Kubernetes para encontrar problemas? Popeye es como un chequeo de salud para tu clúster, encontrando posibles problemas con tus configuraciones y uso de recursos. Es una herramienta de línea de comandos que escanea tu clúster en vivo, no solo archivos estáticos,
Read the full post →
TL/DR;
Tired of manually combing through your Kubernetes cluster for issues? Popeye is like a health check-up for your cluster, finding potential problems with your configurations and resource usage. It's a command-line tool that scans your live cluster, not just static files, and points out things like
Read the full post →
TL/DR;
Uma vulnerabilidade crítica (CVE-2024-6387), apelidada de "regreSSHion", ressurgiu nas versões do servidor OpenSSH 8.5p1 a 9.8p1, o que poderia permitir a execução remota de código como root sem autenticação em sistemas Linux vulneráveis. Este bug, uma regressão da vulnerabilidade CVE-2006-5051 previamente corrigida, destaca a
Read the full post →