search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%256mb%3 00 Llorente"22
?
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(199)
Article
(84)
News
(3)
Blog post
(1)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
22
23
24
25
26
27
28
29
24%
Keeping Docker containers safe
13.02.2017
Home
»
Archive
»
2017
»
Issue 37: Distr...
»
of around 250
MB
to Amazon's S
3
storage very effectively. A number of successful container technologies have been used extensively in the past, including LXC, Solaris Zones, and FreeBSD jails, to name
24%
An IP-based load balancing solution
21.07.2011
Home
»
CloudAge
»
Articles
»
address = 192.168.1.250 eth
0:0
17 vip_nmask = 255.255.255.0 18 port = 80 19 send = "GET / HTTP/1.0\r\n\r\n" 20 expect = "HTTP" 21 use_regex = 0
22
load_monitor = rup 23 ...
3
24%
Prowling AWS
30.01.2020
Home
»
Archive
»
2020
»
Issue 55: AWS L...
»
. For some additional context, sections on the AWS Security Blog [
3
] are worth digging into further. To bring more to the party, the sophisticated Prowler also stealthily prowls for issues in compliance
24%
Make Your IT Automation Systems Play Together Like a Symphony
15.12.2017
Home
»
Archive
»
2017
»
Issue 42: Secur...
»
. Figure 1: Cloud orchestration model In the above figure, the “Service/help desk” domain could be used to configure a particular end point. For example, if you are responsible for configuring
200
23%
Getting started with the Apache Cassandra database
06.10.2019
Home
»
Archive
»
2019
»
Issue 53: Secur...
»
Stax Insights [
3
]. The former enables flexible scalability in Cassandra clusters and consumption-based billing supported by the stability and performance enhancements of DataStax Enterprise, which monitors
23%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home
»
Archive
»
2013
»
Issue 14: Samba 4
»
and supplies (e.g., eBay/PayPal's GO
3
token, known as a "security key"). At the heart of two-factor authentication is the Identikey server, which – in the basic version – comprises a RADIUS interface
23%
Prepare, analyze, and visualize data with R
07.06.2019
Home
»
Archive
»
2019
»
Issue 51: Self-...
»
(dayOfYear):as.factor(wday)Monday 16.64 18 8.382 < 2e-16 *** s(dayOfYear):as.factor(wday)Saturday 11.29 18
3
.307
3.00
e-09 *** s(dayOfYear):as.factor(wday)Sunday 12.92 18 4.843 1.02e-13 *** --- Signif. codes: 0
« Previous
1
...
22
23
24
25
26
27
28
29