26%
28.11.2021
.14, although you can still resort to Docker Machine [3] in this case, which creates a virtual Linux system on the local host that you can then use to access the Docker engine. The example in Figure 1 uses
26%
02.02.2021
Connect [3], the Confluent Schema Registry [4], Kafka Streams [5], and ksqlDB [6] are examples of this kind of infrastructure code. Here, I look at each of these examples in turn.
Data Integration
26%
17.06.2017
One important reason for the success of MySQL [1] is asynchronous replication, introduced in the 2001 release 3.23, which allows admins to set up replica instances (slaves) that receive all data
26%
01.06.2024
is, the fewer vulnerabilities it is likely to have. According to the report, container images smaller than 100MB had 4.4 high or critical vulnerabilities, versus 42.2 for images between 250 and 500MB ... and Management Software; LPI Launches Open Source Essentials Program; Apache Software Foundation Celebrates 25 Years; SUSE Announces Rancher Prime 3.0; NSA Issues Zero Trust Guidelines for Network Security
26%
01.08.2019
://pkg.osquery.io/rpm/GPG | sudo tee /etc/pki/rpm-gpg/RPM-GPG-KEY-osquery
Now add and enable the repository with:
$ sudo yum-config-manager --add-repo https://pkg.osquery.io/rpm/osquery-s3-rpm.repo
$ sudo yum
26%
18.02.2018
in source code, such as:
var PASSWORD = 'sn4k3oil'
This method tackles the challenge of keeping secret information synchronized between all team members in a simple, although not secure, way.
On the one
26%
14.11.2013
it as an "experiment in organic software visualization" [3]. Similarly to Gource, code_swarm animates project changes in a version control system. Files appear as dots; their colors again indicate the file type (Figure
26%
05.02.2023
--name yb2 --hostname yb2 --net=yb -p5432:5433-p7002:7000 yugabytedb/yugabyte:latest yugabyted start --daemon=false --listen yb2 --join yb1
$ docker run -d --name yb3 --hostname yb3 --net=yb-p5433:5433 -p
26%
15.08.2016
. A container consists of the application itself and any library or system dependencies and is referred to as "operating system virtualization" [3]. This higher level of virtualization may allow you to use
26%
27.09.2021
[2] (section 3.2). Next, I built the Darshan utilities (darshan-util) with the command:
./configure CC=gcc --prefix=[binary location]
Because I'm running these tests on an Ubuntu 20.04 system, I had