Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
ansible-guide
Ansible Guide
https://github.com/mikeroyal/ansible-guide
Last synced: 3 days ago
JSON representation
-
Telco Learning Resources
- Citrix Certified Professional – Virtualization(CCP-V)
- Citrix Certified Associate – Networking(CCA-N)
- Network Functions Virtualization Infrastructure (NFVI) by Cisco
- Introduction to vCloud NFV Telco Edge from VMware
- VMware Telco Cloud Automation(TCA) Architecture Overview
- 5G Telco Cloud from VMware
- Red Hat telco ecosystem program
- OpenStack for Telcos by Canonical
- Open source NFV platform for 5G from Ubuntu
- Understanding 5G Technology from Verizon
- Verizon and Unity partner to enable 5G & MEC gaming and enterprise applications
- Network Functions Virtualization Infrastructure (NFVI) by Cisco
- Introduction to vCloud NFV Telco Edge from VMware
- VMware Telco Cloud Automation(TCA) Architecture Overview
- 5G Telco Cloud from VMware
- Red Hat telco ecosystem program
- OpenStack for Telcos by Canonical
- Open source NFV platform for 5G from Ubuntu
- Understanding 5G Technology from Verizon
- Verizon and Unity partner to enable 5G & MEC gaming and enterprise applications
- Telco Acceleration with Xilinx
- VIMs on OSM Public Wiki
- Citrix Certified Associate – Networking(CCA-N)
- Telco Acceleration with Xilinx
- VIMs on OSM Public Wiki
- Certified Information Security Manager(CISM)
- HPE(Hewlett Packard Enterprise) Telco Blueprints overview
- CCNP Routing and Switching
-
Networking Learning Resources
- The Red Hat Certified Specialist in Security: Linux
- Citrix Certified Professional – Virtualization(CCP-V)
- Networking courses and specializations from Coursera
- Network & Security Courses from Udemy
- Network & Security Courses from edX
- Networking courses and specializations from Coursera
- Network & Security Courses from Udemy
- Network & Security Courses from edX
-
Protocols
-
Virtualization
- KVM (for Kernel-based Virtual Machine) - V). It consists of a loadable kernel module, kvm.ko, that provides the core virtualization infrastructure and a processor specific module, kvm-intel.ko or kvm-amd.ko.
- VirtManager
- KVM (for Kernel-based Virtual Machine) - V). It consists of a loadable kernel module, kvm.ko, that provides the core virtualization infrastructure and a processor specific module, kvm-intel.ko or kvm-amd.ko.
- VirtManager
- Xen
- Xen
- Ganeti
- Packer
- Ganeti
- Packer
- Vagrant - to-use workflow and focus on automation, Vagrant lowers development environment setup time, increases production parity, and makes the "works on my machine" excuse a relic of the past. It provides easy to configure, reproducible, and portable work environments built on top of industry-standard technology and controlled by a single consistent workflow to help maximize the productivity and flexibility of you and your team.
- Vagrant - to-use workflow and focus on automation, Vagrant lowers development environment setup time, increases production parity, and makes the "works on my machine" excuse a relic of the past. It provides easy to configure, reproducible, and portable work environments built on top of industry-standard technology and controlled by a single consistent workflow to help maximize the productivity and flexibility of you and your team.
- VirtualBox
- VirtualBox
-
Database Learning Resources
- SQL
- SQL Tutorial by W3Schools
- Learn SQL Skills Online from Coursera
- SQL Online Training Courses from LinkedIn Learning
- SQL
- SQL Tutorial by W3Schools
- Learn SQL Skills Online from Coursera
- SQL Courses Online from Udemy
- SQL Online Training Courses from LinkedIn Learning
- Learn SQL For Free from Codecademy
- GitLab's SQL Style Guide
- OracleDB SQL Style Guide Basics
- Tableau CRM: BI Software and Tools
- Databases on AWS
- Learn SQL For Free from Codecademy
- GitLab's SQL Style Guide
- OracleDB SQL Style Guide Basics
- Databases on AWS
- Connecting from Google Kubernetes Engine to a Cloud SQL instance.
- Connecting from Google Kubernetes Engine to a Cloud SQL instance.
- MySQL Certifications
- What is NoSQL?
- What is NoSQL?
-
Databases and Tools
- Azure Data Studio
- Azure Data Studio
- Azure SQL Database - powered and automated features that optimize performance and durability for you. Serverless compute and Hyperscale storage options automatically scale resources on demand, so you can focus on building new applications without worrying about storage size or resource management.
- Azure SQL Database - powered and automated features that optimize performance and durability for you. Serverless compute and Hyperscale storage options automatically scale resources on demand, so you can focus on building new applications without worrying about storage size or resource management.
- MSSQL for Visual Studio Code
- MSSQL for Visual Studio Code
- SQL Server Migration Assistant
- SQL Server Migration Assistant
- SQL Server Business Intelligence(BI)
- Tableau - releases/press-release-details/2019/Salesforce-Completes-Acquisition-of-Tableau/default.aspx).
- DataGrip - sensitive code completion, helping you to write SQL code faster. Completion is aware of the tables structure, foreign keys, and even database objects created in code you're editing.
- MySQL - native applications using the world's most popular open source database.
- SQL Server Business Intelligence(BI)
- Tableau - releases/press-release-details/2019/Salesforce-Completes-Acquisition-of-Tableau/default.aspx).
- DataGrip - sensitive code completion, helping you to write SQL code faster. Completion is aware of the tables structure, foreign keys, and even database objects created in code you're editing.
- MySQL - native applications using the world's most popular open source database.
- PostgreSQL - relational database system with over 30 years of active development that has earned it a strong reputation for reliability, feature robustness, and performance.
- PostgreSQL - relational database system with over 30 years of active development that has earned it a strong reputation for reliability, feature robustness, and performance.
- Amazon DynamoDB - value and document database that delivers single-digit millisecond performance at any scale. It is a fully managed, multiregion, multimaster, durable database with built-in security, backup and restore, and in-memory caching for internet-scale applications.
- Amazon DynamoDB - value and document database that delivers single-digit millisecond performance at any scale. It is a fully managed, multiregion, multimaster, durable database with built-in security, backup and restore, and in-memory caching for internet-scale applications.
- FoundationDB - value store and employs ACID transactions for all operations. It is especially well-suited for read/write workloads but also has excellent performance for write-intensive workloads. FoundationDB was acquired by [Apple in 2015](https://techcrunch.com/2015/03/24/apple-acquires-durable-database-company-foundationdb/).
- FoundationDB - value store and employs ACID transactions for all operations. It is especially well-suited for read/write workloads but also has excellent performance for write-intensive workloads. FoundationDB was acquired by [Apple in 2015](https://techcrunch.com/2015/03/24/apple-acquires-durable-database-company-foundationdb/).
- CouchbaseDB - model NoSQL document-oriented database](https://en.wikipedia.org/wiki/Multi-model_database). It creates a key-value store with managed cache for sub-millisecond data operations, with purpose-built indexers for efficient queries and a powerful query engine for executing SQL queries.
- CouchbaseDB - model NoSQL document-oriented database](https://en.wikipedia.org/wiki/Multi-model_database). It creates a key-value store with managed cache for sub-millisecond data operations, with purpose-built indexers for efficient queries and a powerful query engine for executing SQL queries.
- MongoDB - like documents.
- MongoDB - like documents.
- OracleDB - critical data with the highest availability, reliability, and security.
- MariaDB - critical applications.
- OracleDB - critical data with the highest availability, reliability, and security.
- MariaDB - critical applications.
- SQLite - language library that implements a small, fast, self-contained, high-reliability, full-featured, SQL database engine.SQLite is the most used database engine in the world. SQLite is built into all mobile phones and most computers and comes bundled inside countless other applications that people use every day.
- SQLite Database Browser
- dbWatch - premise, hybrid/cloud database environments.
- SQLite - language library that implements a small, fast, self-contained, high-reliability, full-featured, SQL database engine.SQLite is the most used database engine in the world. SQLite is built into all mobile phones and most computers and comes bundled inside countless other applications that people use every day.
- SQLite Database Browser
- dbWatch - premise, hybrid/cloud database environments.
- Adminer
- DBeaver
- AppDynamics Database - Volume Production Environment.
- Adminer
- DBeaver
- AppDynamics Database - Volume Production Environment.
- Toad - in expertise. This SQL management tool resolve issues, manage change and promote the highest levels of code quality for both relational and non-relational databases.
- Sequel Pro
- Toad - in expertise. This SQL management tool resolve issues, manage change and promote the highest levels of code quality for both relational and non-relational databases.
- Sequel Pro
- VMware
- VMware
- Azure SQL Managed Instance - premises applications to the cloud with very few application and database changes. Managed instance has split compute and storage components.
- Cosmos DB Profiler - time visual debugger allowing a development team to gain valuable insight and perspective into their usage of Cosmos DB database. It identifies over a dozen suspicious behaviors from your application’s interaction with Cosmos DB.
- Cosmos DB Profiler - time visual debugger allowing a development team to gain valuable insight and perspective into their usage of Cosmos DB database. It identifies over a dozen suspicious behaviors from your application’s interaction with Cosmos DB.
-
Open Source Security Learning Resources
- Back to the Top
- Microsoft Open Source Software Security
- How Layer 7 of the Internet Works
- The 7 Kinds of Security
- The Libgcrypt Reference Manual
- Best Practices for Using Open Source Code from The Linux Foundation
- Microsoft Open Source Software Security
- How Layer 7 of the Internet Works
- The 7 Kinds of Security
- The Libgcrypt Reference Manual
- The Open Web Application Security Project(OWASP) Foundation Top 10
- Best Practices for Using Open Source Code from The Linux Foundation
- AWS Certified Security - Specialty Certification
- RSA Certification Program
- Certified Cloud Security Professional(CCSP) Certification
- RSA Certification Program
- Certified Cloud Security Professional(CCSP) Certification
- Certified Information Systems Security Professional (CISSP) Certification
- Security Training Certifications and Courses from Udemy
- Certified Information Systems Security Professional (CISSP) Certification
- Security Training Certifications and Courses from Udemy
- Security Certifications Training from Pluarlsight
- Security Certifications Training from Pluarlsight
- Kubernetes (K8s) - source system for automating deployment, scaling, and management of containerized applications.
- Kubernetes.io
- Back to the Top
- Kubernetes (K8s) - source system for automating deployment, scaling, and management of containerized applications.
- Kubernetes.io
- Amazon EKS
- Amazon EKS
- AWS Controllers for Kubernetes (ACK) - available Kubernetes applications that utilize AWS services.
- AWS Controllers for Kubernetes (ACK) - available Kubernetes applications that utilize AWS services.
- Anthos - premises environments.
- Helm
- Anthos - premises environments.
- OKD - tenant deployment. OKD adds developer and operations-centric tools on top of Kubernetes to enable rapid application development, easy deployment and scaling, and long-term lifecycle maintenance for small and large teams.
- Odo
- OKD - tenant deployment. OKD adds developer and operations-centric tools on top of Kubernetes to enable rapid application development, easy deployment and scaling, and long-term lifecycle maintenance for small and large teams.
- Odo
- Thanos
- Thanos
- Rook - managing, self-scaling, self-healing storage services. It automates the tasks of a storage administrator: deployment, bootstrapping, configuration, provisioning, scaling, upgrading, migration, disaster recovery, monitoring, and resource management.
- OpenShift Hive
- Rook - managing, self-scaling, self-healing storage services. It automates the tasks of a storage administrator: deployment, bootstrapping, configuration, provisioning, scaling, upgrading, migration, disaster recovery, monitoring, and resource management.
- Kubespray - sigs/kubespray/blob/master/docs/aws.md), GCE, [Azure](https://github.com/kubernetes-sigs/kubespray/blob/master/docs/azure.md), [OpenStack](https://github.com/kubernetes-sigs/kubespray/blob/master/docs/openstack.md), [vSphere](https://github.com/kubernetes-sigs/kubespray/blob/master/docs/vsphere.md), [Packet](https://github.com/kubernetes-sigs/kubespray/blob/master/docs/packet.md) (bare metal), Oracle Cloud Infrastructure (Experimental), or Baremetal.
- Kubespray - sigs/kubespray/blob/master/docs/aws.md), GCE, [Azure](https://github.com/kubernetes-sigs/kubespray/blob/master/docs/azure.md), [OpenStack](https://github.com/kubernetes-sigs/kubespray/blob/master/docs/openstack.md), [vSphere](https://github.com/kubernetes-sigs/kubespray/blob/master/docs/vsphere.md), [Packet](https://github.com/kubernetes-sigs/kubespray/blob/master/docs/packet.md) (bare metal), Oracle Cloud Infrastructure (Experimental), or Baremetal.
- KubeInit
- KubeInit
- Helm
- Knative - based platform to build, deploy, and manage modern serverless workloads. Knative takes care of the operational overhead details of networking, autoscaling (even to zero), and revision tracking.
- Knative - based platform to build, deploy, and manage modern serverless workloads. Knative takes care of the operational overhead details of networking, autoscaling (even to zero), and revision tracking.
- KubeFlow
- KubeFlow
- Etcd - value store that provides a reliable way to store data that needs to be accessed by a distributed system or cluster of machines. Etcd is used as the backend for service discovery and stores cluster state and configuration for Kubernetes.
- Etcd - value store that provides a reliable way to store data that needs to be accessed by a distributed system or cluster of machines. Etcd is used as the backend for service discovery and stores cluster state and configuration for Kubernetes.
- OpenEBS - based tool to create stateful applications using Container Attached Storage.
- Container Storage Interface (CSI) - in.
- MicroK8s - the-air updates for ultra-reliable operations. It is supported on Linux, Windows, and MacOS.
- Lens
- kind
- OpenEBS - based tool to create stateful applications using Container Attached Storage.
- Container Storage Interface (CSI) - in.
- MicroK8s - the-air updates for ultra-reliable operations. It is supported on Linux, Windows, and MacOS.
- Lens
- kind
- Flux CD
- Kata Operator
- Google Kubernetes Engine (GKE) - ready environment for running containerized applications.
- Wireshark Certified Network Analyst (WCNA)
- Cloudflare Open Source Security
- Azure Kubernetes Service (AKS) - grade security and governance. Unite your development and operations teams on a single platform to rapidly build, deliver, and scale applications with confidence.
- AWS Certified Security - Specialty Certification
- Google Cloud Certified Professional Cloud Security Engineer
- Cisco Security Certifications
- The Red Hat Certified Specialist in Security: Linux
- Check Point Certified Security Administrator(CCSA) Certification
- Check Point Certified Security Master (CCSM) Certification
- CCNP Routing and Switching
- Certified Information Security Manager(CISM)
- Wireshark Certified Network Analyst (WCNA)
- Grafana Kubernetes App
- Google Cloud Certified Professional Cloud Security Engineer
- Cisco Security Certifications
- K3s - constrained, remote locations or inside IoT appliances.
-
Tools
- Open Stack - as-a-service (IaaS) to orchestrate data center operations on bare metal, private cloud hardware, public cloud resources, or both (hybrid/multi-cloud architecture). OpenStack includes advance use of virtualization & SDN for network traffic optimization to handle the core cloud-computing services of compute, networking, storage, identity, and image services.
- Airship
- Open Stack - as-a-service (IaaS) to orchestrate data center operations on bare metal, private cloud hardware, public cloud resources, or both (hybrid/multi-cloud architecture). OpenStack includes advance use of virtualization & SDN for network traffic optimization to handle the core cloud-computing services of compute, networking, storage, identity, and image services.
- StarlingX - low latency use cases.
- Airship
- Network functions virtualization (NFV)
- Software Defined Networking (SDN) - based controllers or application programming interfaces (APIs) to communicate with underlying hardware infrastructure and direct traffic on a network. This model differs from that of traditional networks, which use dedicated hardware devices (routers and switches) to control network traffic.
- Virtualized Infrastructure Manager (VIM)
- Management and Orchestration(MANO) - hosted initiative to develop an Open Source NFV Management and Orchestration (MANO) software stack aligned with ETSI NFV. Two of the key components of the ETSI NFV architectural framework are the NFV Orchestrator and VNF Manager, known as NFV MANO.
- OpenRAN - vendor deployments.
- Open vSwitch(OVS)
- Network functions virtualization (NFV)
- Software Defined Networking (SDN) - based controllers or application programming interfaces (APIs) to communicate with underlying hardware infrastructure and direct traffic on a network. This model differs from that of traditional networks, which use dedicated hardware devices (routers and switches) to control network traffic.
- Virtualized Infrastructure Manager (VIM)
- Management and Orchestration(MANO) - hosted initiative to develop an Open Source NFV Management and Orchestration (MANO) software stack aligned with ETSI NFV. Two of the key components of the ETSI NFV architectural framework are the NFV Orchestrator and VNF Manager, known as NFV MANO.
- OpenRAN - vendor deployments.
- Open vSwitch(OVS)
- Multi-access edge computing (MEC) - parties across multi-vendor Multi-access Edge Computing platforms.
- Cloud-Native Network Functions(CNF)
- Physical Network Function(PNF)
- Network functions virtualization infrastructure(NFVI)
- Multi-access edge computing (MEC) - parties across multi-vendor Multi-access Edge Computing platforms.
- Cloud-Native Network Functions(CNF)
- Physical Network Function(PNF)
- Network functions virtualization infrastructure(NFVI)
- Open Source Security Foundation (OpenSSF) - industry collaboration that brings together leaders to improve the security of open source software by building a broader community, targeted initiatives, and best practices. The OpenSSF brings together open source security initiatives under one foundation to accelerate work through cross-industry support. Along with the Core Infrastructure Initiative and the Open Source Security Coalition, and will include new working groups that address vulnerability disclosures, security tooling and more.
- Open Source Security Foundation (OpenSSF) - industry collaboration that brings together leaders to improve the security of open source software by building a broader community, targeted initiatives, and best practices. The OpenSSF brings together open source security initiatives under one foundation to accelerate work through cross-industry support. Along with the Core Infrastructure Initiative and the Open Source Security Coalition, and will include new working groups that address vulnerability disclosures, security tooling and more.
-
Security Standards, Frameworks and Benchmarks
- STIGs Benchmarks - Security Technical Implementation Guides
- ISO Standards Catalogue
- Common Criteria for Information Technology Security Evaluation (CC)
- STIGs Benchmarks - Security Technical Implementation Guides
- ISO Standards Catalogue
- Common Criteria for Information Technology Security Evaluation (CC)
- EU GDPR (General Data Protection Regulation)
- CCPA (California Consumer Privacy Act)
- EU GDPR (General Data Protection Regulation)
- CCPA (California Consumer Privacy Act)
- SOC 2
- SOC 2
- NIST CSF
- NIST CSF
- ISO 22301 - practice framework for implementing an optimised BCMS (business continuity management system).
-
Security Tools
- AppArmor - to-use Linux application security system. AppArmor proactively protects the operating system and applications from external or internal threats, even zero-day attacks, by enforcing good behavior and preventing both known and unknown application flaws from being exploited. AppArmor supplements the traditional Unix discretionary access control (DAC) model by providing mandatory access control (MAC). It has been included in the mainline Linux kernel since version 2.6.36 and its development has been supported by Canonical since 2009.
- AppArmor - to-use Linux application security system. AppArmor proactively protects the operating system and applications from external or internal threats, even zero-day attacks, by enforcing good behavior and preventing both known and unknown application flaws from being exploited. AppArmor supplements the traditional Unix discretionary access control (DAC) model by providing mandatory access control (MAC). It has been included in the mainline Linux kernel since version 2.6.36 and its development has been supported by Canonical since 2009.
- SELinux - rwxr-xr-x) are modifiable by the user and the applications which the user runs. Conversely, SELinux access controls are determined by a policy loaded on the system which may not be changed by careless users or misbehaving applications.
- Control Groups(Cgroups) - defined groups of tasks (processes) running on a system.
- EarlyOOM - memory situations with heavy swap usage.
- Libgcrypt
- Kali Linux - class information security training and penetration testing services.
- Pi-hole - side software, intended for use on a private network. It is designed for use on embedded devices with network capability, such as the Raspberry Pi, but it can be used on other machines running Linux and cloud implementations.
- Aircrack-ng - PSK cracker and analysis tool for 802.11 wireless LANs. It works with any wireless network interface controller whose driver supports raw monitoring mode and can sniff 802.11a, 802.11b and 802.11g traffic.
- Burp Suite
- SELinux - rwxr-xr-x) are modifiable by the user and the applications which the user runs. Conversely, SELinux access controls are determined by a policy loaded on the system which may not be changed by careless users or misbehaving applications.
- Control Groups(Cgroups) - defined groups of tasks (processes) running on a system.
- EarlyOOM - memory situations with heavy swap usage.
- Libgcrypt
- Kali Linux - class information security training and penetration testing services.
- Pi-hole - side software, intended for use on a private network. It is designed for use on embedded devices with network capability, such as the Raspberry Pi, but it can be used on other machines running Linux and cloud implementations.
- Aircrack-ng - PSK cracker and analysis tool for 802.11 wireless LANs. It works with any wireless network interface controller whose driver supports raw monitoring mode and can sniff 802.11a, 802.11b and 802.11g traffic.
- Burp Suite
- KernelCI - based open source distributed test automation system focused on upstream kernel development. The primary goal of KernelCI is to use an open testing philosophy to ensure the quality, stability and long-term maintenance of the Linux kernel.
- KernelCI - based open source distributed test automation system focused on upstream kernel development. The primary goal of KernelCI is to use an open testing philosophy to ensure the quality, stability and long-term maintenance of the Linux kernel.
- Continuous Kernel Integration project
- Continuous Kernel Integration project
- Cilium
- Hubble
- Cilium
- Hubble
- Istio
- Istio
- Certgen
- Scapy - based interactive packet manipulation program & library.
- syzkaller - guided kernel fuzzer.
- Certgen
- Scapy - based interactive packet manipulation program & library.
- syzkaller - guided kernel fuzzer.
- SchedViz
- oss-fuzz
- SchedViz
- oss-fuzz
- OSSEC - source host-based intrusion detection system. It performs log analysis, integrity checking, Windows registry monitoring, rootkit detection, time-based alerting, and active response.
- OSSEC - source host-based intrusion detection system. It performs log analysis, integrity checking, Windows registry monitoring, rootkit detection, time-based alerting, and active response.
- Metasploit Project
- Wfuzz
- Metasploit Project
- Wfuzz
- Nmap
- Patchwork - based patch tracking system designed to facilitate the contribution and management of contributions to an open-source project.
- pfSense
- Snowpatch - based, mailing-list-centric git workflow. This workflow is used by a number of well-known open source projects such as the Linux kernel.
- Snort - source, free and lightweight network intrusion detection system (NIDS) software for Linux and Windows to detect emerging threats.
- Nmap
- Patchwork - based patch tracking system designed to facilitate the contribution and management of contributions to an open-source project.
- pfSense
- Snowpatch - based, mailing-list-centric git workflow. This workflow is used by a number of well-known open source projects such as the Linux kernel.
- Snort - source, free and lightweight network intrusion detection system (NIDS) software for Linux and Windows to detect emerging threats.
- Wireshark - source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education.
- Wireshark - source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education.
- OpenSCAP
- OpenSCAP
- Open Vulnerability and Assessment Language
- ClamAV
- ClamAV
- Tink - language, cross-platform, open source library that provides cryptographic APIs that are secure, easy to use correctly, and harder to misuse.
-
Kubernetes Learning Resources
- Getting started with Kubernetes on AWS
- Getting started with Google Cloud
- Getting started with Kubernetes on Red Hat
- Getting started with Kubernetes on AWS
- Getting started with Google Cloud
- Getting started with Kubernetes on Red Hat
- Elastic Cloud on Kubernetes
- Elastic Cloud on Kubernetes
- Deploy a model to an Azure Kubernetes Service cluster
- Simplify Machine Learning Inference on Kubernetes with Amazon SageMaker Operators
- Deploy a model to an Azure Kubernetes Service cluster
- Simplify Machine Learning Inference on Kubernetes with Amazon SageMaker Operators
- Kubernetes on Microsoft Azure
- Getting started with Kubernetes on IBM
- Getting Kubernetes Certifications
Programming Languages
Categories
Sub Categories
Keywords
security
6
kubernetes
4
tracing
4
fuzz-testing
4
fuzzing
4
kernel
4
metrics
2
ebpf
2
cilium
2
typescript
2
sql-server
2
sql
2
postgresql
2
microsoft
2
electron
2
azure-data-studio
2
azure
2
xen
2
virtualization
2
python
2
opensource
2
kvm
2
haskell
2
rke
2
okd
2
k8s
2
eks
2
cdk
2
automation
2
vulnerabilities
2
stability
2
oss-fuzz
2
visualization
2
scheduling
2
testing
2
security-vulnerability
2
security-tools
2
linux
2
fuzzer
2
observability
2
networking
2