search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(446)
Article
(29)
Blog post
(2)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
11
12
13
14
15
16
17
18
19
20
21
22
23
24
...
48
Next »
69%
Secure cloud-native services with Prisma Cloud Compute
02.06.2020
Home
»
Archive
»
2020
»
Issue 57: Artif...
»
discovering the "
normal
" behavior of your resources, you can then tweak the rulesets to account for anomalies with great ease. The Mothership The architecture includes a centralized server known
69%
Kubernetes containers, fleet management, and applications
06.10.2022
Home
»
Archive
»
2022
»
Issue 71: Kuber...
»
therefore become a genuine community project. However, Kubernetes (aka K8s, because of the eight letters between the K and the s) also seems to have driven a wedge into the
normally
closed ranks
69%
Exploring the Relax and Recoverbackup and rescue system
21.08.2014
Home
»
Archive
»
2014
»
Issue 22: OpenS...
»
can find ReaR in the EPEL repo. SUSE Linux Enterprise includes ReaR packages but only in an older version. (Version 1.14 is also available for openSUSE [
3
], however, I experienced problems
69%
An overview of VMware tools
12.09.2013
Home
»
Archive
»
2013
»
Issue 16: Docker
»
. Figure
3
: vCloud suite architecture (from vmware.
com
). vFabric Application Director The vFabric middleware suite [4], consisting of Data Director, SQLFire, GemFire, PostgreSQL, and RabbitMQ, serves
68%
Expand your sphere with a piece of Google
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
"-//Sun Microsystems, Inc.//DTD Web Application 2.
3
//EN" 04 "http://java.sun.
com
/dtd/web-app_2_
3
.dtd"> 05 06
07
08
68%
Security analysis with Microsoft Advanced Threat Analytics
11.04.2016
Home
»
Archive
»
2016
»
Issue 32: Measu...
»
grows significantly. In both cases, attackers can access not only the services that the user regularly uses but also other systems on the network that the user does not
normally
access. These attacks
68%
Parallel Programming with OpenCL
04.11.2011
Home
»
HPC
»
Articles
»
/object/what_is_cuda_new.html] [
3
] Official OpenCL website: [http://www.khronos.org/registry/cl/] [4] AMD/ATI system requirements, driver compatibility: [http://developer.amd.
com
68%
Tools for hardware diagnostics under Windows
26.01.2025
Home
»
Archive
»
2025
»
Issue 85: Monit...
»
environments without a large IT team and without test equipment for what is
normally
a small number of computers. It is also helpful when it comes to taking an inventory of devices: A pull-down menu below
68%
Managing Linux Memory
11.06.2014
Home
»
Archive
»
2014
»
Issue 21: Manag...
»
address space, for example. In some ways, mmap() replaces
normal
file operations such as read(). As Figure
3
shows, its implementation in Linux differs in one important detail: For read() and the like
68%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home
»
Archive
»
2021
»
Issue 66: Inci...
»
] about how the Dalai Lama and many a government had exploits foisted on them in PDFs [
3
]. Metasploit is everywhere. Charly Kühnast also covered the topic in his Linux Magazine sys admin column [4
« Previous
1
...
11
12
13
14
15
16
17
18
19
20
21
22
23
24
...
48
Next »