search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(1121)
News
(392)
Article
(296)
Blog post
(3)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
117
118
119
120
121
122
123
124
125
126
127
128
129
130
...
182
Next »
18%
Processor and Memory Affinity Tools
14.09.2021
Home
»
HPC
»
Articles
»
. As a result, your carefully planned hardware path can be disrupted, resulting in poor performance. I have run all types of code on my workstation and various clusters, including serial,
Open
MP,
Open
18%
Data Analysis with R and Python
17.02.2015
Home
»
Archive
»
2015
»
Issue 25: Safe...
»
Large volumes of data are most useful if you can study them with intensive data analysis. The
open
source language, R [1], is a powerful tool for evaluating an existing database. The R language
18%
Vulnerability assessment best practices for enterprises
16.08.2018
Home
»
Archive
»
2018
»
Issue 46: CMS S...
»
activity, construction mishaps (e.g., cut fiber optic lines), and other types of incidents. Vulnerabilities Vulnerabilities are often defined as
openings
or pathways that a given threat can exploit to do
18%
CRI-O and Kubernetes Security
30.11.2020
Home
»
Archive
»
2020
»
Issue 60: Secur...
»
Container runtimes continue to evolve at a fast rate, and Red Hat has shifted their focus in the direction of their own Podman container runtime in favor of Docker. Red Hat's
open
source
18%
ZAP provides automated security tests in continuous integration pipelines
23.08.2017
Home
»
Archive
»
2017
»
Issue 41: Kuber...
»
Special Thanks: This article was made possible by support from Linux Professional Institute Commonly, a mixture of
open
source and expensive proprietary tools are shoehorned into a pipeline
18%
Configuration management with CFEngine 3
30.05.2021
Home
»
Archive
»
2021
»
Issue 63: Autom...
»
is still in use in some companies today. As with other
open
source projects, the CFEngine project became increasingly commercialized with wider enterprise use, leading to the formation of a support
18%
Secure cloud-native services with Prisma Cloud Compute
02.06.2020
Home
»
Archive
»
2020
»
Issue 57: Artif...
»
. Although Prisma Cloud Compute is not an
open
source product, I will point you at some
open
source code that might be useful in the container security niche. Once you've had a look at what's included
18%
Let the editor wars begin!
11.10.2016
Home
»
Archive
»
2016
»
Issue 35: Persi...
»
and Ground Rules Before jumping into editor options, I want to put down the assumptions I'm using in my selection of what editors to write about. The starting assumptions are: The focus is on
open
source
18%
Network backups with Amanda
05.12.2016
Home
»
Archive
»
2016
»
Issue 36: Autom...
»
encryption via
Open
SSH on request. This support for encryption through
Open
SSH means you can even back up systems in the DMZ without having to worry about eavesdropping. Current Amanda versions also support
18%
The practical benefits of network namespaces
15.08.2016
Home
»
Archive
»
2016
»
Issue 34: Softw...
»
). The namespaces API comprises three system calls – clone(2), unshare(2), and setns(2) – as well as a few /proc entries. Processes in user space
open
files with /proc/
/ns/ and use their file descriptors to stay
« Previous
1
...
117
118
119
120
121
122
123
124
125
126
127
128
129
130
...
182
Next »