search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(1133)
Article
(286)
News
(72)
Blog post
(4)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
138
139
140
141
142
143
144
145
146
147
148
149
150
Next »
14%
Manage guest accounts in Azure Active Directory
06.10.2022
Home
»
Archive
»
2022
»
Issue 71: Kuber...
»
in the usual way with Postman or Graph Explorer [2], which let you explore the API structure. A more detailed description by Microsoft of the cross-tenant access settings API is available online [
3
]. All
14%
Managing network connections in container environments
30.05.2021
Home
»
Archive
»
2021
»
Issue 63: Autom...
»
Traefik Mesh [
3
]. Today, the vendor has two more products in its lineup: Traefik Pilot is a graphical dashboard that displays connections from Traefik Mesh and Traefik Proxy in a single application
14%
New container solutions for Linux
11.02.2016
Home
»
Archive
»
2016
»
Issue 31: Tunin...
»
, libcontainer . This was not part of the solution right from the start; up until version
0
.9, Docker drew directly on LXC to start and manage containers. However, LXC lacked several features, so Docker decided
14%
Enterprise job scheduling with schedulix
11.02.2016
Home
»
Archive
»
2016
»
Issue 31: Tunin...
»
in this way exist on the market, including IBM Tivoli Workload Scheduler [2], Entire Operations [
3
] by Software AG, or BMC's Control-M Suite [4]. All told, the number of available solutions with and without
14%
IPv6 security on IPv4-only networks
10.06.2015
Home
»
Archive
»
2015
»
Issue 27: Fault...
»
6105) [
3
] and DHCPv6-Shield [4]. These functions are implemented on switches and referred to as First Hop Security. SEND (Secure Neighbor Discovery) [5] is an approach that relies on cryptographically
14%
The TensorFlow AI framework
02.06.2020
Home
»
Archive
»
2020
»
Issue 57: Artif...
»
how to identify cacti in images [2]. © Kaggle Another impressive example of a dataset is the MNIST database (Figure
3
), which contains nearly 60,000 handwriting samples in the form of single
14%
Hyper-V containers with Windows Server 2016
05.12.2016
Home
»
Archive
»
2016
»
Issue 36: Autom...
»
as a network address translation (NAT) device. The new NAT module extends the virtual switch from pure Layer 2 management to partial Layer
3
integration. With the new feature, the switch can forward network
14%
Persistent volumes for Docker containers
09.06.2018
Home
»
Archive
»
2018
»
Issue 45: Autom...
»
ESXi 6.
0
or higher and Docker v1.12 or later. VMware recommends version 1.13, or 17.03 if you want to use the "managed plugin" – the variant from the Docker store. If this is the case, the plugin
14%
Ceph object store innovations
13.06.2016
Home
»
Archive
»
2016
»
Issue 33: IPv6...
»
). Figure 1: For CephFS to work, the cluster needs MONs and OSDs, plus a MDS. They developers beefed up the server in Ceph v10.2.
0
(Jewel). Under the hood, access to Ceph storage via CephFS works almost
14%
Recovering from a cyberattack in a hybrid environment
30.01.2024
Home
»
Archive
»
2024
»
Issue 79: Monit...
»
federated domains from Federated to Managed (Figure
3
), Connect-MGGraph -Scopes Domain.ReadWrite.All,Directory.Access-AsUser.All Get-MGDomain and proceed as follows, Update-MGDomain -DomainId
« Previous
1
...
138
139
140
141
142
143
144
145
146
147
148
149
150
Next »