Before even thinking about using Beta software in a production environment we need to make... more »
Cyber security can be a difficult task to tackle since the issue is so complicated, with many... more »
An experiment to prove that Linux is not eating your RAM. Linux borrows unused RAM for disk... more »
In Unix or Linux system, you need to use “passwd” command to change or set user’s password,... more »
A comprehensive list of the 5 best Ruby on Rails books.
In a previous post I presented four different categories of users that interact with... more »