45%
    
    
    13.02.2017
        
    
    	
         of around 250MB to Amazon's S3 storage very effectively. A number of successful container technologies have been used extensively in the past, including LXC, Solaris Zones, and FreeBSD jails, to name
    
 
		    
				        
    45%
    
    
    02.02.2021
        
    
    	
         Connect [3], the Confluent Schema Registry [4], Kafka Streams [5], and ksqlDB [6] are examples of this kind of infrastructure code. Here, I look at each of these examples in turn.
Data Integration
    
 
		    
				        
    45%
    
    
    28.11.2022
        
    
    	
         and authentication make the most sense (e.g., Okta [3] and Auth0 [4]).
The use of PAM in SMEs is also important, although nowhere near as widespread. However, some of today's IAM offerings offer integrated PAM
    
 
		    
				        
    45%
    
    
    20.05.2014
        
    
    	
        Script. This approach allows event-based processing of work requests and, thus, more concurrent requests than the Apache server can handle – although Apache also has an event-based processing module [3] in its more
    
 
		    
				        
    45%
    
    
    17.02.2015
        
    
    	
         NEW packages will be installed:
libdate-manip-perl libyaml-syck-perl logwatch
As a result, about 12.5MB of new software is installed.
Logwatch gets configuration details several ways:
from script
    
 
		    
				        
    45%
    
    
    18.02.2018
        
    
    	
         (remote syslog) [3], an open source tool for forwarding log messages to a central server using an IP network. It is very configurable using the /etc/rsyslog.conf file and the files in the /etc
    
 
		    
				        
    45%
    
    
    13.12.2018
        
    
    	
        . Search for the following lines in the inventory file:
pg_username=awx
pg_password=awxpass
pg_database=awx
pg_port=5432
After pg_username= and pg_password=, replace the access information for the Postgre
    
 
		    
				        
    45%
    
    
    02.02.2021
        
    
    	
        . One well-known example comes from the field of networks, when securing a website with an application and database. A buffer zone, known as the demilitarized zone (DMZ) [3], has long been established
    
 
		    
				        
    45%
    
    
    05.02.2023
        
    
    	
        ]
Group policy settings for Windows Server 2022 [3]
Windows Server 2022 comes with 47 new policy settings, for a total of 4,442 policies. More key data include:
39 new policies for the computer
    
 
		    
				        
    45%
    
    
    15.08.2016
        
    
    	
         tuning options, and (3) NFS management/policy options (Table 1). In the sections that follow, these options are presented and discussed.
Table 1
Tuning Options
  NFS Performance Tuning