Why You Want Google Authenticator, but Don't Need It

Two factor authentication is an important safeguard for all of your accounts and it has proven itself by protecting one of the largest software engineering organizations in the world from breach. In order to easily control your safety and privacy without resorting to cloud service providers, let’s explore how to adopt dynamic passwords and avoid outsourcing your credentials!

SSH Key Authentication Overview

For those of you new to automation, it can be overwhelming on first exposure to handle every link in the chain to launch your first Nutanix Calm blueprint. Many Calm Marketplace blueprints leverage Linux, cloud-init, and SSH keypairs to enable security best-practices for composable infrastructure as code.

Declarative Operating Systems

A new breed of operating systems adopt declarative configuration management for an interesting hybrid! OS maintenance of long-lived servers remains a challenge for our “mutable” infrastructure.