Articles

Lead Image © Russell Shively, 123RF.com

Lead Image © Russell Shively, 123RF.com

A versatile proxy for microservice architectures

The nimble Envoy proxy server addresses modern container environments, but does it outperform its rival Istio, which has Envoy at its core?
Lead Image © Ewa Walicka, fotolia.com

Lead Image © Ewa Walicka, fotolia.com

Checking your endpoints with Stethoscope

Intruders slip in when end users get sloppy. Check the health of your endpoint devices with Stethoscope.
Lead Image © sdecoret, 123RF.com

Lead Image © sdecoret, 123RF.com

Storage cluster management with LINSTOR

LINSTOR is a toolkit for automated cluster management that takes the complexity out of DRBD management and offers a wide range of functions, including provisioning and snapshots.
Image by Gerd Altmann from Pixabay

Image by Gerd Altmann from Pixabay

Graph database Neo4j discovers fake reviews on Amazon

A Neo4j graph database example shows how to uncover fraudulent reviews on Amazon.
Lead Image © Natalia Lukiyanova, 123RF.com

Lead Image © Natalia Lukiyanova, 123RF.com

Monitoring network traffic with ntopng

The open source ntopng tool provides deep insights into network traffic and supports troubleshooting when network problems occur.
Lead Image © Endrille, Fotolia

Lead Image © Endrille, Fotolia

Monitor your network

Use the open source Pandora FMS monitoring server to keep an eye on all the computers and network devices in your realm.
Lead Image © Maggie Molloy, 123RF.com

Lead Image © Maggie Molloy, 123RF.com

Minifying container images with DockerSlim

DockerSlim minifies your Docker container images up to 30x and adds security, too.
Lead Image © bilderbox, fotolia.com

Lead Image © bilderbox, fotolia.com

Goodbye Google Cloud Print

With the discontinuation of Google Cloud Print, we look at printing going forward in the enterprise.
Lead Image © Amy Walters, 123RF.com

Lead Image © Amy Walters, 123RF.com

Cloud security with AWS GuardDuty

AWS GuardDuty uses machine learning and threat intelligence to identify malicious activity for continuous security monitoring in the cloud.
Lead Image © Ying Feng Johansson, 123RF.com

Lead Image © Ying Feng Johansson, 123RF.com

From Skype for Business to Microsoft Teams

With the end of Skype for Business Online on the horizon, we look at how to migrate your company, fully or partially, to Microsoft Teams.