Articles

Lead Image © Elgris, Fotolia.com

Lead Image © Elgris, Fotolia.com

DiffServ service classes for network QoS

DiffServ service classes provide quality of service on the network for demanding modern applications such as Video over IP.
Lead Image © stokkete, 123RF.com

Lead Image © stokkete, 123RF.com

Retention labels in Office 365

The Office 365 Security & Compliance Center provides a unified interface for managing policies and security settings, including retention labels, which specify how data is handled for compliance with internal policies, data protection laws, and tax legislation.
Lead Image © phive2015, 123rf.com

Lead Image © phive2015, 123rf.com

Secrets and certificate management

Vault is a highly secure, trusted place to keep your secrets and certificates.
Lead Image © Leo Blanchette, 123RF.com

Lead Image © Leo Blanchette, 123RF.com

Solving the security problems of encrypted DNS

DNS encryption offers WiFi users good protection in public spaces; however, in the enterprise, it prevents the evaluation and filtering of name resolution.
Lead Image © lassedesignen, 123RF

Lead Image © lassedesignen, 123RF

Building a virtual NVMe drive

An economical and high-performing hybrid NVMe SSD is exported to host servers that use it as a locally attached NVMe device.

Interview with the MariaDB Foundation board Chairman Eric Herman

Eric Herman, Chairman of the MariaDB Foundation board, sheds light on the evolving focus of the custodians of one of the most popular and widely used databases.
Lead Image © lightwise, 123RF.com

Lead Image © lightwise, 123RF.com

Cloud Foundry realizes a service mesh

Cloud Foundry deployments that use a service mesh routing plane have access to weighted routing, which lets you control the amount of traffic sent to each route.

IBM Open Technology Group

Director of the IBM Open Technology group Nimesh Bhatia shares details about the company's involvement in open source and how its latest acquisition of Red Hat compliments its existing endeavors in the cloud.
Lead Image © sebastien decoret, 123RF.com

Lead Image © sebastien decoret, 123RF.com

The limits and opportunities of artificial intelligence

We talked to Peter Protzel, an academic with experience in knowledge-based systems and process automation, about the future of artificial intelligence.
Lead Image © Eric Issel, 123RF.com

Lead Image © Eric Issel, 123RF.com

Managing Bufferbloat

Bufferbloat impedes TCP/IP traffic and makes life difficult, especially for real-time applications like voice or video.