search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(492)
Article
(146)
News
(12)
Blog post
(1)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
48
49
50
51
52
53
54
55
56
57
58
59
60
61
...
66
Next »
11%
Quick UDP Internet connections
06.10.2022
Home
»
Archive
»
2022
»
Issue 71: Kuber...
»
is known as zero round-trip time (
0
-RTT); it is optional and not mandatory. The problem is the lack of protection against replay attacks. The Header Structure QUIC comes with short and long headers. Until
11%
OrientDB document and graph database
09.08.2015
Home
»
Archive
»
2015
»
Issue 28: SSD RAID
»
.translation embeddedmap; 09 10 create class Relation extends E; 11 create property Relation.from date;
12
13 create class Appear extends E; 14 create property Appear.chapter embeddedlist integer 15 16 insert into Person
11%
Red Hat's cloud and virtualization portfolio
18.07.2013
Home
»
Archive
»
2013
»
Issue 15: What’...
»
into Red Hat's cloud stack (Figure 1). After all, CloudForms 1.1, DeltaCloud 1.
0
, Storage Server 2.
0
, JBoss Middleware, and Enterprise Virtualization 3.1 form the foundation for the new products
11%
SUSE Linux Enterprise 11 SP3 tested
09.01.2013
Home
»
Archive
»
2013
»
Issue 18: New W...
»
the Needed Patches category. This includes an update of the SLE kernel to version 3.
0
.82. You will also find a patch for the Firefox ESR version with extended support from 17.04 to 17.07. The patch may
11%
Secure access to Kubernetes
25.03.2020
Home
»
Archive
»
2020
»
Issue 56: Secur...
»
-flannel-ds-arm-vdprb 1/1 Running 3 26d kube-flannel-ds-arm-xnxqp 1/1 Running
0
26d kube-flannel-ds-arm-zsnpp 1/1 Running 4 34d kube-proxy-lknwh 1
11%
DDoS protection in the cloud
15.08.2016
Home
»
Archive
»
2016
»
Issue 34: Softw...
»
": "
0
x0800" 07 } 08 }, "ip-match": { 09 "ip-protocol": 17 10 }, "ipv4-destination": "10.1.1.2/32", "udp-destination-port": 1234 11 }, "table_id":
0
, "priority": 10
12
11%
A Real-World Look at Scaling to the Amazon Cloud
04.10.2011
Home
»
CloudAge
»
Articles
»
Definition), against which all requests get validated as soon as they are received by one of the processing servers. Listing 2 Request XML 0" encoding="UTF-8"?>
11%
Processing streaming events with Apache Kafka
02.02.2021
Home
»
Archive
»
2021
»
Issue 61: Secur...
»
(KafkaProducerString,
producer = new KafkaProducer
(props)) { 03 04 for (long i =**
0
; i <**10; i++) { 05 final String orderId = "id" + Long.toString(i); 06 final Payment
11%
Exploiting, detecting, and correcting IAM security misconfigurations
07.04.2022
Home
»
Archive
»
2022
»
Issue 68: Autom...
»
attached (Figure
12
). The combination of these two privileges could let the misconfigured user create a new EC2 instance. Not only that, they will have operating system access to which they can pass
11%
Key-value stores: an alternative to relational databases
04.12.2024
Home
»
Archive
»
2024
»
Issue 84: Non-R...
»
://istio.io Vitess for MySQL: https://vitess.io/docs/archive/
12.0
/reference/compatibility/mysql-compatibility/ The Author Martin Loschwitz
« Previous
1
...
48
49
50
51
52
53
54
55
56
57
58
59
60
61
...
66
Next »