search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%xcode%3
?
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(1281)
Article
(340)
News
(200)
Blog post
(5)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
176
177
178
179
180
181
182
183
13%
Log analysis in high-performance computing
28.11.2022
Home
»
Archive
»
2022
»
Issue 72: OpenS...
»
hope to orient you in the correct direction for deploying a log analysis capability. Splunk Although I'm a big supporter of open source, Splunk [
3
], a commercial product, is probably the gold standard
13%
Kafka: Scaling producers and consumers
25.03.2021
Home
»
Archive
»
2021
»
Issue 62: Lean...
»
.a.k.c.FetchSessionHandler:438 - [Consumer clientId=consumer-1, groupId=jesseyates.kafka.mirror] Error sending fetch request (sessionId=INVALID, epoch=INITIAL) to node
3
: org
13%
Nothing works without a profile
10.06.2015
Home
»
Archive
»
2015
»
Issue 27: Fault...
»
the requirements for environments with folder redirection [
3
]. Starting Points Basically, UEM tools have two ways to enable backing up and restoring configuration data. With the "external method," the UEM has
13%
ASM tools and strategies for threat management
26.01.2025
Home
»
Archive
»
2025
»
Issue 85: Monit...
»
of vulnerabilities, so they can be analyzed and continuously monitored. Gartner [
3
] includes Armis, Axonius, Balbix, JupiterOne, Lansweeper, OctoXLabs, runZero, and ThreatAware in its list of CAASM providers
13%
Storage trends for taming the flood of data
27.09.2024
Home
»
Archive
»
2024
»
Issue 83: Storage
»
: the Zenoh data protocol [
3
]. This network protocol is expected to play a similarly important role in data transport to IP in the development of the Internet as Kafka does today for real-time data streaming
13%
The pros and cons of a virtual desktop infrastructure
12.09.2013
Home
»
Archive
»
2013
»
Issue 16: Docker
»
shares, including vWorkspace [
3
] and Pano Logic [4]. What VDI Means When you consider all the benefits, you might expect virtual desktops to be used in environments at least a few dozen clients
« Previous
1
...
176
177
178
179
180
181
182
183