search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(305)
Article
(67)
Blog post
(2)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
23
24
25
26
27
28
29
30
31
32
33
34
35
36
...
38
Next »
18%
Processing streaming events with Apache Kafka
02.02.2021
Home
»
Archive
»
2021
»
Issue 61: Secur...
»
Connect [
3
], the Confluent Schema Registry [4], Kafka Streams [5], and ksqlDB [
6
] are examples of this kind of infrastructure code. Here, I look at each of these examples in turn. Data Integration
18%
MySQL is gearing up with its own high-availability Group Replication solution
17.06.2017
Home
»
Archive
»
2017
»
Issue 39: Conta...
»
One important reason for the success of MySQL [1] is asynchronous replication, introduced in the 2001 release
3
.23, which allows admins to set up replica instances (slaves) that receive all data
18%
Reducing the Attack Surface in Windows
04.12.2024
Home
»
Archive
»
2024
»
Issue 84: Non-R...
»
applications from creating child processes No d4f940ab-401b-4efc-aadc-ad5f
3
c50688a Blocks credential theft from the local security authority subsystem (lsass.exe) Yes 9e
6
c4e1f
18%
News for Admins
01.06.2024
Home
»
Archive
»
2024
»
Issue 81: Load...
»
is, the fewer vulnerabilities it is likely to have. According to the report, container images smaller than 100
MB
had 4.4 high or critical vulnerabilities, versus 42.2 for images between 250 and 500
MB
... and Management Software; LPI Launches Open Source Essentials Program; Apache Software Foundation Celebrates 25 Years; SUSE Announces Rancher Prime
3
.0; NSA Issues Zero Trust Guidelines for Network Security
18%
Efficient password management in distributed teams
18.02.2018
Home
»
Archive
»
2018
»
Issue 43: Real...
»
in source code, such as: var PASSWORD = 'sn4k
3
oil' This method tackles the challenge of keeping secret information synchronized between all team members in a simple, although not secure, way. On the one
18%
Setting up SELinux policies
12.09.2013
Home
»
Archive
»
2013
»
Issue 16: Docker
»
: 1.0 05 Release: 1%{?dist} 06 License: GPL v2 or later 07 Source0: local.te 08 Source1: local.fc
09
Source2: local.if 10 Group: Development/Tools 11 Summary
18%
Visualizing log and other data
14.11.2013
Home
»
Archive
»
2013
»
Issue 17: Cloud...
»
it as an "experiment in organic software visualization" [
3
]. Similarly to Gource, code_swarm animates project changes in a version control system. Files appear as dots; their colors again indicate the file type (Figure
18%
Security as Code
04.10.2018
Home
»
Archive
»
2018
»
Issue 47: Findi...
»
="filtered" reason="no-response" reason_ttl="0"/>
18%
A Container for HPC
15.08.2016
Home
»
Archive
»
2016
»
Issue 34: Softw...
»
. A container consists of the application itself and any library or system dependencies and is referred to as "operating system virtualization" [
3
]. This higher level of virtualization may allow you to use
18%
Code IaC for provisioning of preconfigured virtual environments
26.01.2025
Home
»
Archive
»
2025
»
Issue 85: Monit...
»
is an excellent Bicep-based reference and starting point that helps you get up and running quickly [
3
]. Table 1 BICEP Resource Definitions Resources Versioned w/@yyyy-mm-dd-state Common
« Previous
1
...
23
24
25
26
27
28
29
30
31
32
33
34
35
36
...
38
Next »