search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(920)
Article
(282)
News
(69)
Blog post
(4)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
117
118
119
120
121
122
123
124
125
126
127
128
Next »
15%
Enterprise job scheduling with schedulix
11.02.2016
Home
»
Archive
»
2016
»
Issue 31: Tunin...
»
in this way exist on the market, including IBM Tivoli Workload Scheduler [2], Entire Operations [
3
] by Software AG, or BMC's Control-M Suite [4]. All told, the number of available solutions with and without
15%
IPv6 security on IPv4-only networks
10.06.2015
Home
»
Archive
»
2015
»
Issue 27: Fault...
»
6105) [
3
] and DHCPv6-Shield [4]. These functions are implemented on switches and referred to as First Hop Security. SEND (Secure Neighbor Discovery) [5] is an approach that relies on cryptographically
15%
The TensorFlow AI framework
02.06.2020
Home
»
Archive
»
2020
»
Issue 57: Artif...
»
how to identify cacti in images [2]. © Kaggle Another impressive example of a dataset is the MNIST database (Figure
3
), which contains nearly 60,000 handwriting samples in the form of single
15%
Hyper-V containers with Windows Server 2016
05.12.2016
Home
»
Archive
»
2016
»
Issue 36: Autom...
»
as a network address translation (NAT) device. The new NAT module extends the virtual switch from pure Layer 2 management to partial Layer
3
integration. With the new feature, the switch can forward network
15%
Persistent volumes for Docker containers
09.06.2018
Home
»
Archive
»
2018
»
Issue 45: Autom...
»
ESXi 6.
0
or higher and Docker v1.12 or later. VMware recommends version 1.13, or 17.03 if you want to use the "managed plugin" – the variant from the Docker store. If this is the case, the plugin
15%
Ceph object store innovations
13.06.2016
Home
»
Archive
»
2016
»
Issue 33: IPv6...
»
). Figure 1: For CephFS to work, the cluster needs MONs and OSDs, plus a MDS. They developers beefed up the server in Ceph v10.2.
0
(Jewel). Under the hood, access to Ceph storage via CephFS works almost
15%
Recovering from a cyberattack in a hybrid environment
30.01.2024
Home
»
Archive
»
2024
»
Issue 79: Monit...
»
federated domains from Federated to Managed (Figure
3
), Connect-MGGraph -Scopes Domain.ReadWrite.All,Directory.Access-AsUser.All Get-MGDomain and proceed as follows, Update-MGDomain -DomainId
15%
Secure Kubernetes with Kubescape
03.04.2024
Home
»
Archive
»
2024
»
Issue 80: Threa...
»
to kubectl cluster-info works. Incidentally, kubectl should also exist on the host on which you later call kubescape. The K8s developers explain how to do this in their instructions [
3
]. In most cases
15%
Agentless automation with Event-Driven Ansible
28.11.2023
Home
»
Archive
»
2023
»
Issue 78: Domai...
»
documents how you can program your own source plugins [2]. Therefore, the number of available sources should increase steadily now that EDA has been officially released [
3
]. Spoiler: This article is based
15%
Alternatives to Google Analytics
13.02.2017
Home
»
Archive
»
2017
»
Issue 37: Distr...
»
of online statistics suppliers are Histats [2] and Stetic [
3
]. They differ in that Histats is free of charge for up to 10 million clicks per day, whereas Stetic is generally subject to a charge. Stetic
« Previous
1
...
117
118
119
120
121
122
123
124
125
126
127
128
Next »