33%
22.05.2023
, it is all too often neglected or not taken seriously enough on the fast path from development to production. Microsoft enters the scene for these situations with Azure Sphere [2].
With Azure Sphere ... Microsoft Azure Sphere links three vital elements of the Internet of Things – microcontrollers, software, and cloud service – with a focus on security. ... Azure Sphere for Internet of Things
33%
06.10.2022
Requests for Comments (RFCs) [2]-[5] under numbers 8999 to 9002 in 2021 after a good five years of development at the Internet Engineering Task Force (IETF). In addition to Google, developers from Fastly ... The UDP-based Quick UDP Internet Connections (QUIC) protocol comes with mandatory TLS encryption and promises faster speeds. ... Quick UDP Internet connections
32%
06.08.2013
Traditional administration command-line tools such as ifconfig, route, and arp are almost as old as TCP/IP itself. We provide an overview of how the IPRoute2 toolkit now unifies the management ... tool in IPRoute2 is ip.
In many cases, additional options can be set for the show commands. For example, if you only want to output the IP configuration for eth0
, the short command is
ip address ...
Traditional administration command-line tools such as ifconfig, route, and arp are almost as old as TCP/IP itself. We provide an overview of how the IPRoute2 toolkit now unifies the management ... IPRoute2: arp, route, and ifconfig in a Single Tool ... IPRoute2
30%
02.02.2021
application with FIDO2, I will refer to the sample application as a guide and look for the important components in the examples for an abstract service of your own.
As a concrete use case, I will be looking ... The FIDO and FIDO2 standard supports passwordless authentication. We discuss the requirements for the use of FIDO2 and show a sample implementation for a web service. ... Secure Login with FIDO2 ... Secure authentication with FIDO2
28%
03.12.2015
again a minute later anyway (QoS 0 is fine). Users might want to transmit the position of a mobile device with a bit more reliability (QoS 1 or 2), although the network traffic and costs rise, too ... Although the MQTT protocol is usually associated with the Internet of Things, it also works in some very different situations, such as monitoring, for example.
28%
25.03.2021
application, on the other hand, a very high value directly improves the user experience, because the latency caused by the connection setup can be avoided in the best case.
A high value for http2_max ... HTTP/2, the current representative of the HTTP family, offers several advantages for website operators and their users if the protocol is correctly adapted to the individual scenario. ... HTTP/2 for Nginx ... Setting up HTTP/2 for Nginx
28%
15.08.2016
-comes-after-email/422625/
"John Chambers last keynote as CEO of CISCO," Cisco Live 2015, San Diego, CA, https://www.youtube.com/watch?v=ujBLqLFNr0s (timeline 28:00)
Cisco-Kansas City agreement: https://newsroom.cisco.com ... The Internet of Everything, a fully networked and analyzed society, seeks to enhance the quality of life of all people and drive new technologies, products, services, and markets. But where ... The Internet of Everything
28%
11.04.2016
/blog/2013/12/08/the-origins-of-ansible
Ansible: http://www.ansible.com
Announcement: http://www.ansible.com/blog/ansible-2.0-launch
Installation guide: http://docs.ansible.com ... Ansible 2.0 ... What's new in Ansible 2.0
28%
28.11.2021
distributions support WSL1 and WSL2 differently in some cases. Each distribution can be upgraded or downgraded at any time. WSL1 and WSL2 distributions also can be run side by side. However, to run Docker ... Deploy a full Linux container environment, including a Kubernetes cluster, on Windows with Windows Subsystem for Linux version 2. ... Containers + WSL2 ... Use Linux Containers with WSL2 on Windows
25%
25.03.2021
specifically use when selecting the private key:
attributetype ( 1.3.6.1.4.1.56227.1.1.2
NAME 'fido2credentialId'
EQUALITY caseExactIA5Match
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26
SINGLE-VALUE )
This identifier ... Log in to your account securely without a password with LDAP and a schema to establish the objects and attributes required for FIDO2 authentication. ... Store FIDO2 info in LDAP ... Secure passwordless logins with FIDO2 and LDAP