36%
03.12.2015
are pretty simple for Ubuntu (or Fedora 21) and are well documented [6]. Using the latest software version proved invaluable in the lab tests performed by the magazine's staff (Listing 1).
Ideally, users
36%
11.02.2016
an orchestration solution that is useful for customers who operate virtual machines in cloud environments. In the Ansible manual [6], administrators will find a script for practically any cloud environment
36%
22.12.2017
of a bit of extra work, you will find another blog post on this topic online [6]. To sum up, you need to install an X server such as vcxrc or Xming, add the export DISPLAY=:0.0 entry to .bashrc, and use
36%
15.08.2016
with SCO. You can connect to the Orchestrator Web Console [6] by calling the SCO web server URL. In addition to starting and stopping existing Runbooks, you can see an overview of the current Runbooks
36%
11.10.2016
are created so the application can use MySQL.
Several ready Ansible roles are available on the web that allow you to install and configure the package [5] [6]. To get a working database, you need to create
36%
02.03.2018
Protection (GDPR) [6], which comes into force in May 2018, states that if credit card information is involved, then Payment Card Industry Data Security Standard (PCI DSS) [7] immediately takes effect
36%
16.08.2018
Disk (VHD) file to the resource group from a storage account. It doesn't really matter which method you choose. If you don't want to do all this manually, you can use prefabricated Azure templates [6
36%
30.01.2024
and assigning tasks to the build nodes.
Another important component of the build system is Pulp [6], which provides artifact storage for newly-built packages and other products of the build process. According
36%
09.08.2015
-Xchange
The OX example proves that investments can bear fruit: United Internet Ventures invested EUR15 million in Open-Xchange [6]. The company has constantly expanded the range of products around the OX app suite
36%
14.08.2018
, the command in Listing 6 uses -F
for fast mode, -P
for “protocol ping” (or port status test), and -S
to attempt to spoof the IP address, so the targeted machine doesn’t know where the probe is coming from