A Blog
on the EDGE!
A Blog
on the EDGE!
Chess Terms
The Turk Imagine a machine that could beat any human chess player. That sounds very ordinary. But what if that happened in the eighteenth century...
Intel Keeps Europe Waiting as It Commits to New US Chip Factories
The Chips Act aim to reduce continent's dependence on Asian supplier European Commission will propose the legislation in early February Intel has...
How will Tonga’s broken internet cable be mended?
New Zealand's ministry of foreign affairs says it could take more than a month to repair breaks in the 49,889km (31,000miles) of cable that serves...
Recycling Soda Bottles into Filament to Print Smaller Soda Bottles
Thermoplastics are great, because you can melt them down and reform them into whatever you like. This is ably demonstrated by [The Q] by recycling...
Threat Hunting in Microsoft Azure
A while back, a customer asked me to help inspect what happened to an environment in Azure that got compromised and was used to launch a ransomware...
Automating Security: 7 Major Benefits of a SOAR
This is the first part of a two-part series. The second part is here. SOAR — or security orchestration, automation and response — is a collection of...
Accessing a Private AKS Cluster with Additional Private Endpoints
When creating an AKS cluster, you have the option to make it a private cluster. When you do this, it means the managed API server created for you...
Enable Azure SQL Server vulnerability assessment using Terraform
One of the Microsoft Defender for Cloud recommendations you will see is to enable vulnerability assessment settings on the SQL server. Periodic...
Top 30 Git Commands You Should Know To Master Git CLI
Git is the most popular distributed version control system in the world. Linus Torvalds, the creator of the Linux kernel, built this tool way back...
Microsoft Security Updates January 2022
January, Microsoft released patches today for 96 new CVEs in Microsoft Windows and Windows Components, Microsoft Edge (Chromium-based), Exchange...