1. Software Agents are a Vulnerability

    The agent/server model is another example of expanding the vulnerability surface in computing that has already shown itself to be far too large and permeable. The only solutions that will improve security and automation will avoid use of the agent/server model and should have no routable address space between them.

  2. Why AWS re:Invent 2013 Mattered

    The level of energy and excitement at re:Invent was something none of us had experienced at a software conference before. There are likely many reasons for this, but we primarily attribute it to the fact that AWS has established itself as the undisputed front-runner in cloud with significant momentum among developers and ISVs.

  3. #Pipeday: Celebrating 49 Years of |

    This Friday marks the 49th birthday of the ideas behind one of the most powerful characters in the command shell (both *nix and Windows): the pipe. For those who don't know, the pipe is this character: | It's Shift-Backslash on a US keyboard, and it is used to send the output of one process to the input of another.

  4. Your Beautiful Baby VPC on AWS: Part 1

    Most of the features of Amazon Web Services (AWS) are low risk in terms of changing your mind later. However, one place on the AWS platform where you really need to get things right from the start is in your Virtual Private Cloud (VPC) design.

Take Control of Your Cloud Today

You and your team can be productive with Fugue on AWS in less than an hour, without the need for professional services.