search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(995)
Article
(277)
News
(260)
Blog post
(6)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
18
19
20
21
22
23
24
25
26
27
28
29
30
31
...
154
Next »
12%
TLS 1.3 and the return of common sense
04.10.2018
Home
»
Archive
»
2018
»
Issue 47: Findi...
»
techniques that
bring
network-level attacks against TLS to the browser (e.g., HEIST). Just as the community started thinking the worst was over, ROBOT (Return of Bleichenbacher's Oracle Threat), managed
12%
Kubernetes Auto Analyzer
05.10.2018
Home
»
Archive
»
2018
»
Issue 48: Secur...
»
the authors and others. With security in mind, ever-evolving complexity from a piece of software
brings
headaches. That complexity might be related to the numerous add-ons that Kubernetes supports, its core
12%
A storage engine for every use case
09.04.2019
Home
»
Archive
»
2019
»
Issue 50: Bpfilter
»
MySQL knows very little about how to manage a table. Instead, it delegates such operations to a specific plugin type
called
the storage engine, which is the implementation of some important
12%
The practical benefits of network namespaces
15.08.2016
Home
»
Archive
»
2016
»
Issue 34: Softw...
»
). The namespaces API comprises three system
calls
– clone(2), unshare(2), and setns(2) – as well as a few /proc entries. Processes in user space open files with /proc/
/ns/ and use their file descriptors to stay
12%
Mocking and emulating AWS and GCP services
05.08.2024
Home
»
Archive
»
2024
»
Issue 82: Sover...
»
/local/bin/run.sh ENTRYPOINT ["run.sh"] Finally, create the YAML file in Listing 9 to
bring
up the local Bigtable service, as well as the quick test routine, with the command docker run --rm -v /var
12%
What’s New in Microsoft Windows 8.1
21.01.2014
Home
»
Articles
»
the temperatures at several locations at a glance, which will mainly interest mobile users. If the computer is locked, users can still access features such as the camera and even generally accept Skype
calls
12%
Load Testing the Cloud
20.02.2012
Home
»
CloudAge
»
Blogs
»
Dan Frost's Blog
»
) increases because scaling that 1 percent of failed hits doesn’t mean just 1 percent of users. (On a side note: you should urge your developers to degrade their app gracefully so that if the Ajax
calls
fail
12%
Five HPC Pitfalls – Part 2
09.04.2012
Home
»
HPC
»
Articles
»
a Linux distribution on each node and testing network connectivity. A vendor’s ability to deliver a usable cluster is
called
the “stand-up rate” and is, in effect, how long it takes to provide a fully
12%
Fedora 18 for Admins
11.06.2013
Home
»
Articles
»
, the packages are smaller, thanks to improved DWARF compression. systemd 195 To initialize system start, Fedora 18 uses systemd version 195, which
brings
several new command-line tools to system configuration
12%
Comparing startup times of Linux distros in the cloud
27.09.2021
Home
»
Archive
»
2021
»
Issue 65: 7 Em...
»
these events. The ec2-boot-bench tool [5] takes four measurements: (1) the duration of the RunInstances API
call
, (2) the time to transition from a pending to a running state, (3) how much longer the network
« Previous
1
...
18
19
20
21
22
23
24
25
26
27
28
29
30
31
...
154
Next »