Remove tag
article thumbnail

Unlocking the Value of your Runbook Automation Value Metrics with Snowflake, Jupyter Notebooks, and Python by Justyn Roberts

PagerDuty

This blog was co-authored by Justyn Roberts, Senior Solutions Consultant, PagerDuty Automation has become an integral piece in business practices of the modern organization. In this blog, we are going to zoom in on two key integrations, Snowflake and Jupyter Notebooks. We’re too busy to take the time to automate those tasks!”

article thumbnail

How to Deploy a Docker Image with Ansible

Pure Storage

How to Deploy a Docker Image with Ansible by Pure Storage Blog Docker and Ansible are two powerful tools for automating software development and deployment. tag: Specify the image tag to pull. tag: Specify the image tag to pull. Docker_image: Specifies the Ansible module to interact with Docker images.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Deploy a Docker Image with Ansible

Pure Storage

How to Deploy a Docker Image with Ansible by Pure Storage Blog Docker and Ansible are two powerful tools for automating software development and deployment. tag: Specify the image tag to pull. tag: Specify the image tag to pull. Docker_image: Specifies the Ansible module to interact with Docker images.

article thumbnail

The Top Vulnerabilities in Software Security

Assurance IT

Cross-site scripting problems can arise in one of two ways: When a program puts untrusted data in a new web page without authenticating it. Don’t give them out the HTML tags. As you can tell after reading this blog, the top 5 vulnerabilities in software security are serious. This also protects against HTML injection.

article thumbnail

The Pure1® REST API

Pure Storage

I will focus on authentication, the swagger option, and how to use it. A couple things about the Pure1 REST: Authentication is different than what is used with the FlashArray REST. A few that are one time only, and a few that are required for each authentication session: Create a PEM-based RSA SSL public/private key pair.

article thumbnail

Data Mesh vs. Data Fabric: What’s the Difference?

Pure Storage

by Pure Storage Blog In today’s digital landscape, organizations face a wide array of data management challenges due to the increasing volume, variety, and complexity of data—and all the various apps and users who need to access that data. appeared first on Pure Storage Blog. Data Mesh vs. Data Fabric: What’s the Difference?