search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(495)
Article
(146)
News
(12)
Blog post
(1)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
48
49
50
51
52
53
54
55
56
57
58
59
60
61
...
66
Next »
11%
Red Hat's cloud and virtualization portfolio
18.07.2013
Home
»
Archive
»
2013
»
Issue 15: What’...
»
into Red Hat's cloud stack (Figure 1). After all, CloudForms 1.1, DeltaCloud 1.
0
, Storage Server 2.
0
, JBoss Middleware, and Enterprise Virtualization 3.1 form the foundation for the new products
11%
SUSE Linux Enterprise 11 SP3 tested
09.01.2013
Home
»
Archive
»
2013
»
Issue 18: New W...
»
the Needed Patches category. This includes an update of the SLE kernel to version 3.
0
.82. You will also find a patch for the Firefox ESR version with extended support from 17.04 to 17.07. The patch may
11%
Secure access to Kubernetes
25.03.2020
Home
»
Archive
»
2020
»
Issue 56: Secur...
»
-flannel-ds-arm-vdprb 1/1 Running 3 26d kube-flannel-ds-arm-xnxqp 1/1 Running
0
26d kube-flannel-ds-arm-zsnpp 1/1 Running 4 34d kube-proxy-lknwh 1
11%
DDoS protection in the cloud
15.08.2016
Home
»
Archive
»
2016
»
Issue 34: Softw...
»
": "
0
x0800" 07 } 08 }, "ip-match": { 09 "ip-protocol": 17 10 }, "ipv4-destination": "10.1.1.2/32", "udp-destination-port": 1234 11 }, "table_id":
0
, "priority": 10
12
11%
Processing streaming events with Apache Kafka
02.02.2021
Home
»
Archive
»
2021
»
Issue 61: Secur...
»
(KafkaProducerString,
producer = new KafkaProducer
(props)) { 03 04 for (long i =**
0
; i <**10; i++) { 05 final String orderId = "id" + Long.toString(i); 06 final Payment
11%
Open Source Security Information and Event Management system
20.05.2014
Home
»
Archive
»
2014
»
Issue 20: IPv6...
»
and lets you know of changes or foul play on the data link layer. P
0
f – An effective passive fingerprinting tool to identify OS and software on endpoints and to show how the machine is connected
11%
A Real-World Look at Scaling to the Amazon Cloud
04.10.2011
Home
»
CloudAge
»
Articles
»
Definition), against which all requests get validated as soon as they are received by one of the processing servers. Listing 2 Request XML 0" encoding="UTF-8"?>
11%
Exploiting, detecting, and correcting IAM security misconfigurations
07.04.2022
Home
»
Archive
»
2022
»
Issue 68: Autom...
»
attached (Figure
12
). The combination of these two privileges could let the misconfigured user create a new EC2 instance. Not only that, they will have operating system access to which they can pass
11%
Key-value stores: an alternative to relational databases
04.12.2024
Home
»
Archive
»
2024
»
Issue 84: Non-R...
»
://istio.io Vitess for MySQL: https://vitess.io/docs/archive/
12.0
/reference/compatibility/mysql-compatibility/ The Author Martin Loschwitz
11%
Application-aware batch scheduler
26.03.2025
Home
»
Archive
»
2025
»
Issue 86: Data...
»
://$APISERVER --deploy-mode cluster --name spark-wordcount --class org.apache.spark.examples.JavaWordCount local:///opt/spark/examples/jars/spark-examples_2.
12
-3.5.2.jar s3a://data/war-and-peace.txt watch kubectl get po
« Previous
1
...
48
49
50
51
52
53
54
55
56
57
58
59
60
61
...
66
Next »