search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(469)
Article
(155)
News
(17)
Blog post
(4)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
17
18
19
20
21
22
23
24
25
26
27
28
29
30
...
65
Next »
19%
Isolate workloads from Docker and Kubernetes with Kata Containers
05.02.2019
Home
»
Archive
»
2019
»
Issue 49: Anato...
»
with widespread cloud software or other infrastructure projects, developers have brought together the ingredients of Microsoft and Intel and created the Kata Containers project under the Apache license [
3
]. In May
19%
Using the MQTT IoT protocol for unusual but useful purposes
03.12.2015
Home
»
Archive
»
2015
»
Issue 30: OpenD...
»
. Clients don't actually know whether they really see all the messages that arrive at the broker; the broker ACLS decide this. Messages transport payloads; payload data can also be binary and be up to
256
MB
19%
Installing and operating the Graylog SIEM solution
13.12.2018
Home
»
Archive
»
2018
»
Issue 48: Secur...
»
. The pwgen command generates a password and encrypts with sh
256
sum: pwgen -N 1 -
s
100 echo -n
| sha
256
sum The encrypted password is then assigned to the parameter root_password_sha2. Table 1 gives
19%
Supercharge your software upgrade routine
05.08.2024
Home
»
Archive
»
2024
»
Issue 82: Sover...
»
installed Ubuntu MATE
22.04.3
platform), first install all the requirements for compiling and deploying topgrade-rs (referred to as Topgrade moving forward): curl, git, pkg-config, and rust. Once in place
19%
Setting up an OpenNebula Cloud
05.09.2011
Home
»
CloudAge
»
Articles
»
for AWS APIs; therefore, Eucalyptus clouds can scale out to Amazon EC2. Eucalyptus also implements an Amazon
S
3
-compliant storage component called Walrus. Walrus is primarily a virtual machine repository
19%
RAM Revealed
26.04.2012
Home
»
Articles
»
consumption. Because all of the signal lines run through the i
MB
on LR-DIMMs, the electrical load on the memory controller is lower compared with registered DIMMs. From the memory controller’
s
point of view, LR
19%
IPv6 Tables
20.05.2014
Home
»
Archive
»
2014
»
Issue 20: IPv6...
»
, you can define the following anti-spoofing rules: # Anti-spoofing ip6tables -A INPUT ! -i lo -
s
::1/128 -j DROP ip6tables -A INPUT -i $WAN_IF -
s
FC
00
::/7 -j DROP ip6tables -A FORWARD -
s
::1/128 -j DROP
19%
Obtain certificates with acme.sh
27.09.2021
Home
»
Archive
»
2021
»
Issue 65: 7 Em...
»
/.acme.sh/www.example.com/www.example.com.cer -noout -issuer -subject -dates -serial issuer= /C=US/O=Let's Encrypt/CN=R
3
subject= /CN=www.example.com notBefore=Feb 21 13:
00
:28 2021 GMT notAfter=May
22
13:
00
:28 2021 GMT serial=03B46ADF0F26B94C19443669
19%
Post-Quantum Cryptography with TutaCrypt
26.03.2025
Home
»
Archive
»
2025
»
Issue 86: Data...
»
now. With that need in mind, the email vendor Tuta [
3
] just rolled out a new version of their Tuta Mail product (Figure 1) that features quantum-resistant encryption, becoming one of the first
19%
Overview of cloud platforms and appliances
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
, your scaling options are virtually unlimited, and you can add Content Delivery Networks (CDN). As an example, SlideShare [1] integrates document downloads and Flash file hosting with Amazon
S
3
and Cloud
« Previous
1
...
17
18
19
20
21
22
23
24
25
26
27
28
29
30
...
65
Next »