<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Tue, 14 Apr 2026 18:59:49 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>TechSNAP - Episodes Tagged with “Ansible”</title>
    <link>https://techsnap.systems/tags/ansible</link>
    <pubDate>Thu, 11 Oct 2018 17:45:00 -0700</pubDate>
    <description>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Systems, Network, and Administration Podcast. </itunes:subtitle>
    <itunes:author>Jupiter Broadcasting</itunes:author>
    <itunes:summary>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Jupiter Broadcasting</itunes:name>
      <itunes:email>chris@jupiterbroadcasting.com</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>Episode 387: Private Cloud Building Blocks</title>
  <link>https://techsnap.systems/387</link>
  <guid isPermaLink="false">c6e35c4d-a8a5-4394-8e7f-9acd91aa5aa2</guid>
  <pubDate>Thu, 11 Oct 2018 17:45:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/c6e35c4d-a8a5-4394-8e7f-9acd91aa5aa2.mp3" length="28532297" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We bring in Amy Marrich to break down the building blocks of OpenStack. There are nearly an overwhelming number of ways to manage your infrastructure, and we learn about one of the original tools.</itunes:subtitle>
  <itunes:duration>33:37</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We bring in Amy Marrich to break down the building blocks of OpenStack. There are nearly an overwhelming number of ways to manage your infrastructure, and we learn about one of the original tools.
Plus a few warm up stories, a war story, and more.
 Special Guest: Amy Marrich.
</description>
  <itunes:keywords>IPFS, Phishing, RFC, Uber, Writing Things Down, Kata Containers, Containers, Kubernetes, CRI, Private Cloud, OpenStack, Rocky, Zun, Zuul, Magnum, Ansible, Amy Marrich, SysAdmin, Rachel Kroll, OpenStack Training Artichect, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We bring in Amy Marrich to break down the building blocks of OpenStack. There are nearly an overwhelming number of ways to manage your infrastructure, and we learn about one of the original tools.</p>

<p>Plus a few warm up stories, a war story, and more.</p><p>Special Guest: Amy Marrich.</p><p>Links:</p><ul><li><a title="James Stanley - Someone used my IPFS gateway for phishing" rel="nofollow" href="https://incoherency.co.uk/blog/stories/hardbin-phishing.html">James Stanley - Someone used my IPFS gateway for phishing</a></li><li><a title="Scaling Engineering Teams via Writing Things Down and Sharing" rel="nofollow" href="https://blog.pragmaticengineer.com/scaling-engineering-teams-via-writing-things-down-rfcs/">Scaling Engineering Teams via Writing Things Down and Sharing</a> &mdash; I have recently been talking at small and mid-size companies, sharing engineering best practices I see us use at Uber, which I would recommend any tech company adopt as they are growing. The one topic that gets both the most raised eyebrows, as well the most "aha!" moments is the one on how the planning process for engineering has worked since the early years of Uber.</li><li><a title="Say hello to Kata Containers" rel="nofollow" href="http://superuser.openstack.org/articles/kata-containers-1-0/">Say hello to Kata Containers</a> &mdash; Kata Containers bridges the gap between traditional VM security and the lightweight benefits of traditional Linux containers.</li><li><a title="Disappearing videos and disappointed grandmothers" rel="nofollow" href="https://rachelbythebay.com/w/2018/10/05/recipes/">Disappearing videos and disappointed grandmothers</a> &mdash; Here's another story about broken things with some of the details changed just a little. If it sounds familiar, it's probably because your company also did it at some point.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We bring in Amy Marrich to break down the building blocks of OpenStack. There are nearly an overwhelming number of ways to manage your infrastructure, and we learn about one of the original tools.</p>

<p>Plus a few warm up stories, a war story, and more.</p><p>Special Guest: Amy Marrich.</p><p>Links:</p><ul><li><a title="James Stanley - Someone used my IPFS gateway for phishing" rel="nofollow" href="https://incoherency.co.uk/blog/stories/hardbin-phishing.html">James Stanley - Someone used my IPFS gateway for phishing</a></li><li><a title="Scaling Engineering Teams via Writing Things Down and Sharing" rel="nofollow" href="https://blog.pragmaticengineer.com/scaling-engineering-teams-via-writing-things-down-rfcs/">Scaling Engineering Teams via Writing Things Down and Sharing</a> &mdash; I have recently been talking at small and mid-size companies, sharing engineering best practices I see us use at Uber, which I would recommend any tech company adopt as they are growing. The one topic that gets both the most raised eyebrows, as well the most "aha!" moments is the one on how the planning process for engineering has worked since the early years of Uber.</li><li><a title="Say hello to Kata Containers" rel="nofollow" href="http://superuser.openstack.org/articles/kata-containers-1-0/">Say hello to Kata Containers</a> &mdash; Kata Containers bridges the gap between traditional VM security and the lightweight benefits of traditional Linux containers.</li><li><a title="Disappearing videos and disappointed grandmothers" rel="nofollow" href="https://rachelbythebay.com/w/2018/10/05/recipes/">Disappearing videos and disappointed grandmothers</a> &mdash; Here's another story about broken things with some of the details changed just a little. If it sounds familiar, it's probably because your company also did it at some point.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 353: Too Many Containers</title>
  <link>https://techsnap.systems/353</link>
  <guid isPermaLink="false">76cf88a2-f5d9-4dba-b314-f9f00e3767df</guid>
  <pubDate>Thu, 25 Jan 2018 16:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/76cf88a2-f5d9-4dba-b314-f9f00e3767df.mp3" length="31823746" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We introduce you to Kubernetes, what problems it solves, why everyone is talking about it, and where it came from. Also who shouldn’t be using Kubernetes, and the problems you can run into when scaling it.</itunes:subtitle>
  <itunes:duration>43:08</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We introduce you to Kubernetes, what problems it solves, why everyone is talking about it, and where it came from. Also who shouldn’t be using Kubernetes, and the problems you can run into when scaling it.
Plus how you can store files in others DNS resolver cache, Project Zero finds a new BitTorrent client flaw, and more.
</description>
  <content:encoded>
    <![CDATA[<p>We introduce you to Kubernetes, what problems it solves, why everyone is talking about it, and where it came from. Also who shouldn’t be using Kubernetes, and the problems you can run into when scaling it.</p>

<p>Plus how you can store files in others DNS resolver cache, Project Zero finds a new BitTorrent client flaw, and more.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li></ul><p>Links:</p><ul><li><a title="DNSFS. Store your files in others DNS resolver caches" rel="nofollow" href="https://blog.benjojo.co.uk/post/dns-filesystem-true-cloud-storage-dnsfs">DNSFS. Store your files in others DNS resolver caches</a> &mdash; The DNSFS code is a relatively simple system, every file uploaded is split into 180 byte chunks, and those chunks are “set” inside caches by querying the DNSFS node via the public resolver for a TXT record. After a few seconds the data is removed from DNSFS memory and the data is no longer on the client computer.</li><li><a title="BPF - the forgotten bytecode" rel="nofollow" href="https://blog.cloudflare.com/bpf-the-forgotten-bytecode/">BPF - the forgotten bytecode</a> &mdash; BPF is an absolutely marvelous and flexible way of filtering packets.</li><li><a title="dnsfs: Store your data in others DNS revolvers cache" rel="nofollow" href="https://github.com/benjojo/dnsfs">dnsfs: Store your data in others DNS revolvers cache</a> &mdash; Store your data in others DNS revolvers cache</li><li><a title="Unauthenticated LAN remote code execution in AsusWRT" rel="nofollow" href="https://raw.githubusercontent.com/pedrib/PoC/master/advisories/asuswrt-lan-rce.txt">Unauthenticated LAN remote code execution in AsusWRT</a> &mdash; However due to a number of coding errors, it is possible for an unauthenticated attacker in the LAN to achieve remote code execution in the router as the root user.</li><li><a title="AI is moving towards acceptance in cyber security, says Check Point" rel="nofollow" href="http://www.computerweekly.com/news/252433705/AI-is-moving-towards-acceptance-in-cyber-security-says-Check-Point">AI is moving towards acceptance in cyber security, says Check Point</a> &mdash; Artificial intelligence is well on its way to being a useful tool in the cyber security professional’s kit, but according to Check Point, there are still big challenges to overcome.</li><li><a title="Alphabet is launching a new CyberSecurity unit." rel="nofollow" href="https://www.linkedin.com/pulse/alphabet-launching-new-cybersecurity-unit-justin-sleight/">Alphabet is launching a new CyberSecurity unit.</a> &mdash; Alphabet, the parent company of Google, announced today that they will be launching Chronicle, a new business unit that will focus on Cyber Security, using their servers and infrastructure. The new organization hopes to focus on machine learning and artificial intelligence to assist in the fight against cybercrime moving forward.

</li><li><a title="Google Project Zero claims new BitTorrent flaw could enable cyber crooks get into users&#39; PCs" rel="nofollow" href="https://www.v3.co.uk/v3-uk/news/3024532/google-project-zero-claims-new-bittorrent-flaw-could-enable-cyber-crooks-get-into-users-pcs">Google Project Zero claims new BitTorrent flaw could enable cyber crooks get into users' PCs</a> &mdash; According to Project Zero, the client is vulnerable to a DNS re-binding attack that effectively tricks the PC into accepting requests via port 9091 from malicious websites that it would (and should) ordinarly ignore. </li><li><a title="CVE-2018-5702: Mitigate dns rebinding attacks against daemon by taviso · Pull Request #468" rel="nofollow" href="https://github.com/transmission/transmission/pull/468">CVE-2018-5702: Mitigate dns rebinding attacks against daemon by taviso · Pull Request #468</a></li><li><a title="Blizzard Fixes DNS Rebinding Flaw that Put All the Company&#39;s Users at Risk" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/blizzard-fixes-dns-rebinding-flaw-that-put-all-the-companys-users-at-risk/">Blizzard Fixes DNS Rebinding Flaw that Put All the Company's Users at Risk</a></li><li><a title="What is DNS rebinding, in layman&#39;s terms?" rel="nofollow" href="https://www.quora.com/What-is-DNS-rebinding-in-laymans-terms">What is DNS rebinding, in layman's terms?</a></li><li><a title="An Introduction to Kubernetes" rel="nofollow" href="https://www.digitalocean.com/community/tutorials/an-introduction-to-kubernetes">An Introduction to Kubernetes</a> &mdash; Kubernetes, at its basic level, is a system for managing containerized applications across a cluster of nodes. In many ways, Kubernetes was designed to address the disconnect between the way that modern, clustered infrastructure is designed, and some of the assumptions that most applications and services have about their environments.</li><li><a title="What is Kubernetes?" rel="nofollow" href="https://www.redhat.com/en/topics/containers/what-is-kubernetes">What is Kubernetes?</a> &mdash; Kubernetes was originally developed and designed by engineers at Google. Google was one of the early contributors to Linux container technology and has talked publicly about how everything at Google runs in containers. (This is the technology behind Google’s cloud services.) Google generates more than 2 billion container deployments a week—all powered by an internal platform: Borg. Borg was the predecessor to Kubernetes and the lessons learned from developing Borg over the years became the primary influence behind much of the Kubernetes technology.</li><li><a title="Scaling Kubernetes to 2,500 Nodes" rel="nofollow" href="https://blog.openai.com/scaling-kubernetes-to-2500-nodes/">Scaling Kubernetes to 2,500 Nodes</a> &mdash; We’ve been running Kubernetes for deep learning research for over two years. While our largest-scale workloads manage bare cloud VMs directly, Kubernetes provides a fast iteration cycle, reasonable scalability, and a lack of boilerplate which makes it ideal for most of our experiments.</li><li><a title="Feedback: Talk more about Windows" rel="nofollow" href="https://slexy.org/view/s21GdmdxDs">Feedback: Talk more about Windows</a> &mdash; I listened to your intro to change management and it seemed like it will be very Linux centric ("everything is she"). I'm future segments, please try to include windows desktop and server OS as well.</li><li><a title="Question: Starting with Ansible Quick" rel="nofollow" href="https://slexy.org/view/s2sGYopuRw">Question: Starting with Ansible Quick</a> &mdash; Are there any way to get started other than writing a playbook and trying it out with trial and error?</li><li><a title="Ansible Best Practises: A project structure that outlines some best practises of how to use ansible" rel="nofollow" href="https://github.com/enginyoyen/ansible-best-practises">Ansible Best Practises: A project structure that outlines some best practises of how to use ansible</a> &mdash; A project structure that outlines some best practises of how to use ansible</li><li><a title="ansible-console: An Interactive REPL for Ansible" rel="nofollow" href="https://yobriefca.se/blog/2017/01/10/ansible-console-an-interactive-repl-for-ansible/">ansible-console: An Interactive REPL for Ansible</a> &mdash; omething found out recently is that Ansible has an interactive REPL of sorts in ansible-console for doing some adhoc things on a collection of hosts.</li><li><a title="Introduction To Ad-Hoc Commands — Ansible Documentation" rel="nofollow" href="http://docs.ansible.com/ansible/latest/intro_adhoc.html">Introduction To Ad-Hoc Commands — Ansible Documentation</a> &mdash; An ad-hoc command is something that you might type in to do something really quick, but don’t want to save for later.

</li><li><a title="About the security content of macOS High Sierra 10.13.3, Security Update 2018-001 Sierra, and Security Update 2018-001 El Capitan - Apple Support" rel="nofollow" href="https://support.apple.com/en-us/HT208465">About the security content of macOS High Sierra 10.13.3, Security Update 2018-001 Sierra, and Security Update 2018-001 El Capitan - Apple Support</a> &mdash; This document describes the security content of macOS High Sierra 10.13.3, Security Update 2018-001 Sierra, and Security Update 2018-001 El Capitan.

</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We introduce you to Kubernetes, what problems it solves, why everyone is talking about it, and where it came from. Also who shouldn’t be using Kubernetes, and the problems you can run into when scaling it.</p>

<p>Plus how you can store files in others DNS resolver cache, Project Zero finds a new BitTorrent client flaw, and more.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li></ul><p>Links:</p><ul><li><a title="DNSFS. Store your files in others DNS resolver caches" rel="nofollow" href="https://blog.benjojo.co.uk/post/dns-filesystem-true-cloud-storage-dnsfs">DNSFS. Store your files in others DNS resolver caches</a> &mdash; The DNSFS code is a relatively simple system, every file uploaded is split into 180 byte chunks, and those chunks are “set” inside caches by querying the DNSFS node via the public resolver for a TXT record. After a few seconds the data is removed from DNSFS memory and the data is no longer on the client computer.</li><li><a title="BPF - the forgotten bytecode" rel="nofollow" href="https://blog.cloudflare.com/bpf-the-forgotten-bytecode/">BPF - the forgotten bytecode</a> &mdash; BPF is an absolutely marvelous and flexible way of filtering packets.</li><li><a title="dnsfs: Store your data in others DNS revolvers cache" rel="nofollow" href="https://github.com/benjojo/dnsfs">dnsfs: Store your data in others DNS revolvers cache</a> &mdash; Store your data in others DNS revolvers cache</li><li><a title="Unauthenticated LAN remote code execution in AsusWRT" rel="nofollow" href="https://raw.githubusercontent.com/pedrib/PoC/master/advisories/asuswrt-lan-rce.txt">Unauthenticated LAN remote code execution in AsusWRT</a> &mdash; However due to a number of coding errors, it is possible for an unauthenticated attacker in the LAN to achieve remote code execution in the router as the root user.</li><li><a title="AI is moving towards acceptance in cyber security, says Check Point" rel="nofollow" href="http://www.computerweekly.com/news/252433705/AI-is-moving-towards-acceptance-in-cyber-security-says-Check-Point">AI is moving towards acceptance in cyber security, says Check Point</a> &mdash; Artificial intelligence is well on its way to being a useful tool in the cyber security professional’s kit, but according to Check Point, there are still big challenges to overcome.</li><li><a title="Alphabet is launching a new CyberSecurity unit." rel="nofollow" href="https://www.linkedin.com/pulse/alphabet-launching-new-cybersecurity-unit-justin-sleight/">Alphabet is launching a new CyberSecurity unit.</a> &mdash; Alphabet, the parent company of Google, announced today that they will be launching Chronicle, a new business unit that will focus on Cyber Security, using their servers and infrastructure. The new organization hopes to focus on machine learning and artificial intelligence to assist in the fight against cybercrime moving forward.

</li><li><a title="Google Project Zero claims new BitTorrent flaw could enable cyber crooks get into users&#39; PCs" rel="nofollow" href="https://www.v3.co.uk/v3-uk/news/3024532/google-project-zero-claims-new-bittorrent-flaw-could-enable-cyber-crooks-get-into-users-pcs">Google Project Zero claims new BitTorrent flaw could enable cyber crooks get into users' PCs</a> &mdash; According to Project Zero, the client is vulnerable to a DNS re-binding attack that effectively tricks the PC into accepting requests via port 9091 from malicious websites that it would (and should) ordinarly ignore. </li><li><a title="CVE-2018-5702: Mitigate dns rebinding attacks against daemon by taviso · Pull Request #468" rel="nofollow" href="https://github.com/transmission/transmission/pull/468">CVE-2018-5702: Mitigate dns rebinding attacks against daemon by taviso · Pull Request #468</a></li><li><a title="Blizzard Fixes DNS Rebinding Flaw that Put All the Company&#39;s Users at Risk" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/blizzard-fixes-dns-rebinding-flaw-that-put-all-the-companys-users-at-risk/">Blizzard Fixes DNS Rebinding Flaw that Put All the Company's Users at Risk</a></li><li><a title="What is DNS rebinding, in layman&#39;s terms?" rel="nofollow" href="https://www.quora.com/What-is-DNS-rebinding-in-laymans-terms">What is DNS rebinding, in layman's terms?</a></li><li><a title="An Introduction to Kubernetes" rel="nofollow" href="https://www.digitalocean.com/community/tutorials/an-introduction-to-kubernetes">An Introduction to Kubernetes</a> &mdash; Kubernetes, at its basic level, is a system for managing containerized applications across a cluster of nodes. In many ways, Kubernetes was designed to address the disconnect between the way that modern, clustered infrastructure is designed, and some of the assumptions that most applications and services have about their environments.</li><li><a title="What is Kubernetes?" rel="nofollow" href="https://www.redhat.com/en/topics/containers/what-is-kubernetes">What is Kubernetes?</a> &mdash; Kubernetes was originally developed and designed by engineers at Google. Google was one of the early contributors to Linux container technology and has talked publicly about how everything at Google runs in containers. (This is the technology behind Google’s cloud services.) Google generates more than 2 billion container deployments a week—all powered by an internal platform: Borg. Borg was the predecessor to Kubernetes and the lessons learned from developing Borg over the years became the primary influence behind much of the Kubernetes technology.</li><li><a title="Scaling Kubernetes to 2,500 Nodes" rel="nofollow" href="https://blog.openai.com/scaling-kubernetes-to-2500-nodes/">Scaling Kubernetes to 2,500 Nodes</a> &mdash; We’ve been running Kubernetes for deep learning research for over two years. While our largest-scale workloads manage bare cloud VMs directly, Kubernetes provides a fast iteration cycle, reasonable scalability, and a lack of boilerplate which makes it ideal for most of our experiments.</li><li><a title="Feedback: Talk more about Windows" rel="nofollow" href="https://slexy.org/view/s21GdmdxDs">Feedback: Talk more about Windows</a> &mdash; I listened to your intro to change management and it seemed like it will be very Linux centric ("everything is she"). I'm future segments, please try to include windows desktop and server OS as well.</li><li><a title="Question: Starting with Ansible Quick" rel="nofollow" href="https://slexy.org/view/s2sGYopuRw">Question: Starting with Ansible Quick</a> &mdash; Are there any way to get started other than writing a playbook and trying it out with trial and error?</li><li><a title="Ansible Best Practises: A project structure that outlines some best practises of how to use ansible" rel="nofollow" href="https://github.com/enginyoyen/ansible-best-practises">Ansible Best Practises: A project structure that outlines some best practises of how to use ansible</a> &mdash; A project structure that outlines some best practises of how to use ansible</li><li><a title="ansible-console: An Interactive REPL for Ansible" rel="nofollow" href="https://yobriefca.se/blog/2017/01/10/ansible-console-an-interactive-repl-for-ansible/">ansible-console: An Interactive REPL for Ansible</a> &mdash; omething found out recently is that Ansible has an interactive REPL of sorts in ansible-console for doing some adhoc things on a collection of hosts.</li><li><a title="Introduction To Ad-Hoc Commands — Ansible Documentation" rel="nofollow" href="http://docs.ansible.com/ansible/latest/intro_adhoc.html">Introduction To Ad-Hoc Commands — Ansible Documentation</a> &mdash; An ad-hoc command is something that you might type in to do something really quick, but don’t want to save for later.

</li><li><a title="About the security content of macOS High Sierra 10.13.3, Security Update 2018-001 Sierra, and Security Update 2018-001 El Capitan - Apple Support" rel="nofollow" href="https://support.apple.com/en-us/HT208465">About the security content of macOS High Sierra 10.13.3, Security Update 2018-001 Sierra, and Security Update 2018-001 El Capitan - Apple Support</a> &mdash; This document describes the security content of macOS High Sierra 10.13.3, Security Update 2018-001 Sierra, and Security Update 2018-001 El Capitan.

</li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
