Articles

Lead Image © Andrea De Martin, 123RF.com

Lead Image © Andrea De Martin, 123RF.com

Software inventory with PowerShell

PowerShell easily combines different interfaces for querying or reporting data.
Lead Image © Lucy Baldwin, 123RF.com

Lead Image © Lucy Baldwin, 123RF.com

Filesystem Murder Mystery

Slow file rename prompts a cloud exploration.
Lead Image © Vasiliy-Yakobchuk, 123RF.com

Lead Image © Vasiliy-Yakobchuk, 123RF.com

Asset tracking with RFID

RFID technology can help you keep track of data center inventory if you can support the up-front costs.
Lead Image © spleen87, photocase.com

Lead Image © spleen87, photocase.com

Scanning servers with Nikto

The Nikto scanner performs multiple comprehensive tests against web servers.
Lead Image by serhat-beyazkaya, Unsplash.com

Lead Image by serhat-beyazkaya, Unsplash.com

CI/CD deliverables pipeline

Build a continuous integration pipeline by linking Git, Jenkins, Docker, and GitHub into a build chain that can be flexibly extended and modified.
Lead Image © lassedesignen, 123RF.com

Lead Image © lassedesignen, 123RF.com

Privileged Identity Management in Azure AD

Azure Active Directory privileged identity management provides just enough administration for admins to carry out their work, while minimizing the possibility of security breaches through privileged admin accounts.
Lead Image © Amri Wolfgang, 123RF.com

Lead Image © Amri Wolfgang, 123RF.com

Jenkins Configuration as Code

The move from Groovy scripts to Jenkins Configuration as Code simplifies the initialization of Jenkins and Jenkins plugins.
Lead Image © Author, 123RF.com

Lead Image © Author, 123RF.com

Scale Your Docker Containers with Docker Swarm

If you've experienced the power of a single Docker container, you're in for a treat. Thanks to Docker Swarm, you can scale that container with the help of as many nodes as you need.
Lead Image © Maikloff, Fotolia.com

Lead Image © Maikloff, Fotolia.com

A storage engine for every use case

You can choose from among a number of open source database storage engines for both general and specialized data.
Lead Image © loiic, Fotolia.com

Lead Image © loiic, Fotolia.com

Securing containers with Anchore

Anchore produces a detailed analysis of your container images for known vulnerabilities in your application and operating system packages.