Etcd, ZooKeeper, Consul, and similar programs are currently the subject of heated debate in the world of configuration management. We investigate the problems they seek to solve and promises they make.
We describe some basic considerations for choosing a Security Information and Event Management system and designing its implementation.
Although attacks on computers are numerous and varied, they are predominantly based on the same techniques. Microsoft closes these vulnerabilities on Windows computers using the Enhanced Mitigation Experience Toolkit (EMET).
We take a close look at the Exchange Management Shell – an essential tool for Exchange administrators.
Half-lives of products are becoming shorter and shorter on today's virtualization market. This year, the buzz is all about Docker.
The PostgreSQL Global Development Group recently introduced the new major version 9.4 of the popular free database, which includes innovative functions as well as a whole range of changes regarding speed and functionality.
Windows 10 brings an updated, fifth release of PowerShell that vastly simplifies the task of managing modules and software packages. The scripting language now also handles various formatted output from commands and selection lists.
Virtual networks and server structures require additional mechanisms to ensure visibility of data streams. We show how to monitor and analyze network functions, even when virtualization is involved.
The OpenBSD origins of the OpenSMTPD mail transfer agent makes SMTP easier to implement and manage and more secure.
We take you through the installation of a Storm cluster and discuss how to create your own topologies.
12.04 LTS 16 cores 8 cores AMD AMD-V ARB ARSC Active Directory Administration Amazon AWS Amazon CloudFront Anaconda Analytics Apache Apache Deltacloud Apache benchmarking tool Architecture Review Board Archiving ab acquisition alert amazon analysis analysis application performance arp cache poisoning arpspoof article submission astrophysics