16%
14.08.2017
such as containers. In native cloud environments, Prometheus [3], with its time series database approach, has therefore blossomed into an indispensable tool. The software is related to the Kubernetes [4] container
16%
08.08.2014
.
Another way to think of data analytics is the combination of two concepts: ``data analysis'' and ``analytics.'' Data analysis [3] is very similar to data analytics, in that it is the process of massaging
16%
20.03.2014
"name": "net0",
22 "description": "public"
23 }
24 ],
25 "ssh_key": true
26 },
27 "disk_driver": "virtio",
28 "nic_driver": "virtio",
29 "uuid": "555793a9-3c
16%
11.10.2016
for another editor.
ex
Ex [1] was written by Bill Joy [2] in 1976 as something of a replacement for the original *nix editor named ed [3] (ed was developed in 1969). Bill Joy modified a development of ed
16%
22.12.2017
, and after the developers set up Chrome with Brotli support, other browser manufacturers followed suit. Today, Brotli supports all major browsers [3].
Brotli on the Server Side
Things look less rosy
16%
02.06.2020
a database server. Among other things, you can use it for fine-tuning, to monitor its vitals, and to design and execute a backup strategy. The appliance uses Prometheus [2] and Grafana [3] to collect
16%
26.01.2025
SC24 took place in Atlanta, GA, November 17-22. As I'm writing this, 17,959 attendees – that's 3,000+ more than last year – registered. More than 500 companies filled the exhibition floor, which
16%
31.10.2025
and then explicitly allow certain users access. It's similar to the deny by default approach I touched on in another article [3]. To achieve this, the /etc/hosts.deny file would look like this:
sshd: ALL
To allow
16%
29.09.2020
at the blog [3] reveals that new versions of Cockpit are released approximately every two weeks.
In an article from 2015 [4], ADMIN
looked into the topic of managing Linux servers with Cockpit; since then
16%
04.04.2023
(NIST) National Vulnerability [2] or the Aqua Vulnerability [3] database.
Figure 1: An image scan with Trivy generates a long list of vulnerabilities