search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%6mb 2010 Llorente"523
?
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(148)
Article
(15)
News
(4)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
10
11
12
13
14
15
16
17
10%
Secure microservices with centralized zero trust
04.04.2023
Home
»
Archive
»
2023
»
Issue 74: The F...
»
are all at least five years out of date; I tried it on Kubernetes v1.24 and had no problems, because all of the Kubernetes objects required are completely standard. Simply clone the repo [
6
] and deploy
10%
Computational storage that supports storage operations
30.01.2024
Home
»
Archive
»
2024
»
Issue 79: Monit...
»
is older than you might suspect. The people at ScaleFlux have been working on computational storage drives since 2014, and by
2020
, their hardware was already well established on the market. Since then
10%
Three full-text desktop search engines
28.11.2021
Home
»
Archive
»
2021
»
Issue 66: Inci...
»
for future enhancements that were never implemented. Interested parties are largely left to their own devices when trying to determine Tracker's current feature set. The blog [
6
] maintained by Sam Thursfield
10%
Caching with CacheFS
07.07.2020
Home
»
HPC
»
Articles
»
: active (running) since Sat
2020
-07-04 11:00:41 EDT; 33min ago Docs: man:systemd-sysv-generator(8) Process: 819 ExecStart=/etc/init.d/cachefilesd start (code=exited, status=0/SUCCESS) Tasks: 1 (limit: 4915) CGroup
10%
Processing streaming events with Apache Kafka
02.02.2021
Home
»
Archive
»
2021
»
Issue 61: Secur...
»
Connect [3], the Confluent Schema Registry [4], Kafka Streams [5], and ksqlDB [
6
] are examples of this kind of infrastructure code. Here, I look at each of these examples in turn. Data Integration
10%
Designing a Secure Active Directory
26.03.2025
Home
»
Archive
»
2025
»
Issue 86: Data...
»
(PAM) trust [
6
] to the Red Forest. You might also want to consider the use of smart cards for Red Forest logins and use shadow principals to assign principals from the Red Forest permissions in a Golden
10%
Web applications with Julia
26.01.2025
Home
»
Archive
»
2025
»
Issue 85: Monit...
»
others are Fortran, C, and C++). Because of the emphasis on technical computing in the Julia community, most of the books [
6
] and online documentation and tutorials are aimed at scientists and engineers
« Previous
1
...
10
11
12
13
14
15
16
17