24%
30.01.2020
on the storage area network (SAN). I talk about where it makes sense to influence the data stream and how possible bottlenecks can be detected at an early stage. To this end, I will be determining the critically ... We discuss the possible bottlenecks in Fibre Channel storage area networks and how to resolve them.
24%
06.10.2019
standard used throughout the world.
With Perl sockets, you can communicate with any computer that is connected by the Internet or a network. To communicate with this other computer, you specify the server ... Perl sockets work like file handles that can span across a network or the entire Internet.
23%
19.04.2012
-managed computing, storage, and networking resources to build efficient, automated private and public cloud infrastructures.
The Essex release delivers user-requested features for improved automation, integration ...
OpenStack announces the release of Essex, community-driven software that allows users to leverage pools of on-demand, self-managed computing, storage, and networking resources.
23%
13.12.2011
OpenDNS, a leading provider of DNS services, has released an open source tool to encrypt DNS traffic to protect network connections between the user’s computer and the company’s servers.
22%
30.01.2020
that campaign, hackers scanned up to 59,000 IP networks for exposed API endpoints. Once attackers located an exposed endpoint, an Alpine Linux OS container was deployed to run the command
chroot /mnt /bin/sh -c ... In the news: Canonical now offers an Ubuntu Pro image for AWS; Vulnerable Docker instance sought out by Monero malware; Cumulus Networks enhances their network-specific Linux; and SUSE adds SUSE
22%
07.04.2022
The Domain Name System (DNS) puts you in a position to contain the spread of malware and prevent suspicious activities within your corporate network and, with appropriate filters on your DNS server ... The Domain Name System is repeatedly the target of or is leveraged for attacks on corporate infrastructures; however, it also lets you protect corporate networks against attacks and malware
22%
13.12.2011
infrastructure, architecture, products, and network configuration. The actions required to discover this information might seem harmless and might even be overlooked by security administrators as “network noise ...
Professional attackers have much more pointed at your site than just Nmap, and you should too if you want to test your network’s security. We’ll show you some tools intruders use to gather
22%
11.04.2016
version to make working with them far easier in some cases.
Setting Up Bridge Devices
The systemd-networkd network manager can now handle a variety of different network devices; its feature set has been ... Version 219 of the controversial init system, systemd, comes with a few major changes. We look at the new features in network management and container handling.
22%
02.06.2020
does machine learning actually mean in a technical sense? What is deep learning, and how does a neural network work? All these concepts appear regularly in the TensorFlow context, and without ... The TensorFlow symbolic math library can help you introduce artificial intelligence, deep learning, and neural networks into your projects.
22%
29.09.2020
In the past, network duties in the data center were strictly separated: admins took care of the Linux systems, storage admins of the network storage, and network admins of the routers and switches ... Calico chooses an unusual approach for software-defined networking, relying on open standards like BGP. We look at the distinctions and advantages of Calico.