search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(922)
Article
(319)
News
(106)
Blog post
(4)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
123
124
125
126
127
128
129
130
131
132
133
134
135
136
Next »
15%
Grafana and time series databases
14.08.2017
Home
»
Archive
»
2017
»
Issue 40: Lean...
»
, Grafana is a server that speaks HTTP(
S
) and exposes a graphical web interface. Under the hood, the service has a plugin interface for various back ends (i.e., between Grafana and various time series
15%
Management improvements, memory scaling, and EOL for FileStore
06.10.2022
Home
»
Archive
»
2022
»
Issue 71: Kuber...
»
protocol; it emulates either OpenStack's Swift protocol or Amazon
S
3
. In many places, the RADOS gateway is used as a supplement for providers who want to offer their customers on-demand online storage
15%
Managing network connections in container environments
30.05.2021
Home
»
Archive
»
2021
»
Issue 63: Autom...
»
of IT in the early 2000
s
see networks (and often storage as well) as the devil's work. Traefik counters this: It aims to make software-defined networking (SDN) approaches in container environments obsolete
15%
Automating development environments and deployment with Otto
11.02.2016
Home
»
Archive
»
2016
»
Issue 31: Tunin...
»
of continuous integration [2] or continuous delivery [
3
], allowing developers to extend their projects quickly, add new features, and deliver the goods. Because they handle classical administrative tasks
15%
Automated compliance testing with InSpec
22.12.2017
Home
»
Archive
»
2017
»
Issue 42: Secur...
»
is InSpec. InSpec is available under a free license and is free for download from Chef's GitHub directory [
3
]. It supports a variety of target systems: Linux is represented by CentOS, RHEL, SLES, Debian
15%
Searching for security flaws and exploits with Burp Suite
20.03.2014
Home
»
Archive
»
2014
»
Issue 19: Perim...
»
tab within the Proxy section. For the rest of the exercise, you'll need a browser (Firefox), two Firefox extensions (Cookies Manager+ [2] and FoxyProxy Standard [
3
]), and Burp Suite
15%
Cloud-native application bundles for easy container deployment
25.03.2020
Home
»
Archive
»
2020
»
Issue 56: Secur...
»
standard that can even be distributed from Docker Hub. Duffle Duffle (Figure
3
) unabashedly refers to itself as the reference implementation of the CNAB format and provides a variety of functions
15%
Discover system vulnerabilities and exploits
06.10.2019
Home
»
Archive
»
2019
»
Issue 53: Secur...
»
tools are available for testing your own systems. Of course, I assume you will only target your infrastructure and not that of others. Many Options With an image size of about
3
.5GB, Kali Linux
15%
Recovering from a cyberattack in a hybrid environment
30.01.2024
Home
»
Archive
»
2024
»
Issue 79: Monit...
»
federated domains from Federated to Managed (Figure
3
), Connect-MGGraph -Scopes Domain.ReadWrite.All,Directory.Access-AsUser.All Get-MGDomain and proceed as follows, Update-MGDomain -DomainId
15%
Hyper-V failover with Azure Site Recovery
03.04.2024
Home
»
Archive
»
2024
»
Issue 80: Threa...
»
in combination with Hyper-V or other hypervisors. Azure Site Recovery (ASR) is Microsoft's disaster recovery as a service (DRaa
S
). Thanks to ASR, companies can replicate their Hyper-V VMs in Azure and restore them
« Previous
1
...
123
124
125
126
127
128
129
130
131
132
133
134
135
136
Next »