10%
05.12.2014
to abandon the old ways of doing things.
How to Achieve "Old-Fashioned" HA
That said, inside a KVM virtual machine, you can do what you want: You obviously can install Linux, then you can install DRBD ... We show how to create highly available SmartOS zones using UCARP.
10%
04.08.2020
.
Detection Algorithm
The last of the previously mentioned criteria seems interesting from a programming point of view. How does an algorithm find groups of users who all rate the same products without having ... A Neo4j graph database example shows how to uncover fraudulent reviews on Amazon.
10%
04.10.2011
of command-line tools for EC2.
S3 [6] (Simple Storage Service) offers permanent storage independent of EC2 virtual machines being deployed and shut down. Specifically, we use S3 to store the code that gets ... The Amazon cloud environment adapts easily to custom solutions. We'll show you how one company built their solution in the cloud.
10%
05.02.2023
Microsoft Azure
https://portal.azure.com
Azure AD admin center
https://aad.portal.azure.com
Microsoft 365 admin center
https://admin.microsoft.com ... Azure AD is one of the most important authentication services for cloud environments. We show you how to delegate authorizations in Azure AD to ensure better security.
10%
13.06.2016
Some people consider container systems like Docker [1] a new form of virtualization – a natural continuation of KVM [2], Xen [3], VMware [4], Hyper-V [5], and the Zones concept in Solaris [6 ... DevOps and container technology often appear together. If you have one of them, you get the other automatically. However, as the following plea for reason shows, it isn't always that simple.
10%
05.02.2019
to hand over the /etc/passwd file for scrutiny.
Check It Out
A forward slash in the crafted URL is encoded by %2F
, which should get you thinking about how a computer interprets user input. One ... Pitting the OWASP Zed Attack Proxy against an insecure web app in a Docker container illustrates how you can tick a lot of security checkboxes.
10%
16.07.2015
Lmod is an indispensable tool for high-performance computing. With the new release of version 6, now is a good time to review Lmod and look at its new capabilities.
... and has some unique features. I've written about Lmod before, but recently a new version 6.0 was announced that has some new tools that make it worth reviewing.
Fundamentals of Environment Modules ...
Lmod is an indispensable tool for high-performance computing. With the new release of version 6, now is a good time to review Lmod and look at its new capabilities.
... Lmod 6.0: Exploring the Latest Edition of the Powerful Environment Module System
10%
30.11.2025
-built plugin filter Metasploit Framework
in your penetration testing. You will get a glimpse at how pen testers use Metasploit to probe and penetrate a real-world system. I will also cover some useful ... The powerful Metasploit framework helps you see your network as an intruder would see it. You might discover it is all too easy to get past your own defenses.
10%
14.03.2013
'm not sure where to get the code, but it seems to be part of some Linux distributions. A nice tutorial on the wiki [18] also explains how to use it.
System Profiling
At this point, you can glean some timing ... Computing hardware is constantly changing, with new CPUs and accelerators, and the integration of both. How do you know which processors are right for your code?
10%
22.12.2017
VolumeReclaimPolicy": "Retain"
18 },
19 "status": {}
20 }
Listing 6
Mounting Volumes
# oc create -f pv01.json
persistentvolume "glusterfs-1ba23e11" created
# oc get pv
NAME CAPACITY ... More and more companies are outsourcing their applications to containers. We look at storage management and how storage of persistent data can be leveraged within containers.