34%
03.12.2015
:info
16 title: Linux Magazine
17 format = {payload}
WebSockets
Modern web browsers can use MQTT with the help of WebSockets. The Paho project [5] provides a JavaScript module for MQTT. All brokers
34%
11.02.2016
entered the stage and conquered the hearts of administrators and hipsters alike: Docker [5].
Docker
Docker (Figure 5) stands among the ranks of established solutions because it has already been working
34%
25.03.2020
to a remote block device – specifically, an NVMe target. (2) The target
will be the server exporting the NVMe device across the network and to the host server.
A Linux 5.0 or later kernel is required on both
34%
26.10.2017
] Ferm: http://ferm.foo-projects.org
[5] DebOps padlock documentation: https://docs.debops.org/en/latest/debops-tools/docs/scripts/debops-padlock.html
[6] DebOps on GitHub: https://github.com/debops
34%
22.12.2017
H. Recently, Proxmox VE reached version 5.0. In this article, I look at what Proxmox can do, what applications it serves, and what you might pay for support.
KVM and LXC
Proxmox VE sees itself as a genuine ... Proxmox has been working for years on their virtualization manager that does not require a cloud. We look at the improved reliability and new features in version 5.0. ... Proxmox 5.0
34%
22.12.2017
Python package tool [5]. The command is
pip install debops
which puts DebOps in /usr/local/bin/debops, where it is now ready for use.
The next step largely depends on whether you supervise your hosts
34%
14.03.2018
it outside of Amazon Web Services (AWS). The setup is specifically adapted to AWS and is an implicit part of Auto Scaling.
Similarly, OpenStack [4] has a separate service called Senlin [5] for automatic
34%
05.02.2019
of containers and can roll them out in a Kubernetes cluster (Figure 5).
Figure 5: "Deploy everywhere" is Habitat's motto, and Habitat can roll out services
34%
10.06.2015
6105) [3] and DHCPv6-Shield [4]. These functions are implemented on switches and referred to as First Hop Security. SEND (Secure Neighbor Discovery) [5] is an approach that relies on cryptographically
34%
04.08.2015
. If you prefer not to wait, you should take a closer look at the competitor products StackTach [5] or Monasca [6], which offer at least some of the required features.
Spring Cleaning at Horizon
The end