Koha tips and tricks
Koha is a Library Management System used worldwide by approximately 15,000 libraries. The Koha team at Catalyst are passionate about using Koha and helping libraries (big and...
Why world's largest radio telescope is an opportunity for NZ
The NZ SKA forum took place recently at Auckland University of Technology (AUT).
This four-day event brought together a wide variety of national and international visitors who...
Open values at VALA2018
Around about now I should start emailing you to say, “come and talk to Catalyst about your library technology plans! Visit me at Stand 44 at #Vala2018!” right? Well, yes, but...
An introduction to Inkscape for absolute beginners
Image credits : John Morgan on Flickr, CC BY 2.0
Inkscape is a powerful, open source desktop application for creating two-dimensional scalable vector graphics....
Serverless Computing in OpenStack
Qinling delivers Function as a Service (Serverless Computing) in OpenStack clouds.
Lingxian Kong and Feilong Wang are senior cloud engineers from the Catalyst Cloud...
Blockchain 101 - part 2
Introduction
In my previous post I covered key concepts fundamental to understanding blockchain technology, and detailed a small handful of real world use-cases. In this post I...
Work In Progress
On November 8, some Catalystas attended the Work in Progress Conference in Wellington.
We had the privilege of listening to a whole day of incredible speakers who opened our...
Moving away from Symantec Certificate Authorities
An ever-growing number of security issues have been identified with certificates issued by Symantec Certificate Authorities (CAs) over recent years. Affected certificates include...
Cutting our AWS spend in half
It often seems that, by default, our AWS monthly spends go in only one direction - up.
Our AWS cost reduction strategy has evolved over time, through the work we’ve done for...
Security vulnerabilities: what you need to know
Wi-Fi KRACK
Overnight, security weaknesses have been published in the WPA2 protocol used by most home and commercial Wi-Fi systems, including public Wi-Fi. The attack that...
Blockchain 101
You’ve heard of bitcoin, and you read about Silk Road a while back. Bitcoin is just ‘geek money’ and you can’t possibly do anything useful with it... right?
Wrong.
The bar...
Vagrant and LXD
Managing Development Environments
We use a variety of technologies to help us manage development environments. One of these is Linux Containers, and more...