17%
13.02.2017
, so I attended all three days of the conference and also cast my vote. I was at the venue every morning at 8:00am because, unlike previous years, they didn't have one long keynote on the first day
17%
06.10.2019
Most Internet services rely on the Transmission Control Protocol (TCP), an interprocess communication protocol that dates back to the 1980s, an era when data streams were more like trickles by today
17%
04.10.2018
-app . --name=$APP"
20 # create a new application from the image in the OpenShift registry
21 - "oc start-build $APP --from-dir=. --follow || sleep 3s"
22 # start a new build
23 - "oc get routes $APP
17%
27.12.2017
be subjected, it’s critical to capture important changes and events made by users and processes on your running systems.
Highlighting such changes could potentially point toward something as innocuous
17%
20.06.2022
class: https://github.com/josephwright/beamer/
S5: https://meyerweb.com/eric/tools/s5/
DZSlides: http://paulrouget.com/dzslides/
Slidy: https://www.w3.org/Talks/Tools/Slidy2/#(1)
Slideous
17%
18.02.2018
for Internet Security (CIS) [3] – a kind of best practices guide for the use of containers (Figure 1).
Figure 1: Docker Bench for Security checks containers
17%
20.03.2014
in Windows Azure; you will find this on the Azure portal [3]. The familiar Windows backup interface is used for backing up and restoring. You can also control the process in Windows PowerShell; a separate
17%
04.08.2020
], LANDESK [3], Google's G Suite Mobile Management [4], and bitFit [5].
Herd Immunity
One of the most impressive aspects of Netflix's Stethoscope is that, when it displays its findings, it generously
17%
21.11.2017
Earlier this year, there were multiple reports of vulnerabilities in Intel’s Management Engine (ME) that allows remote management of corporate systems. The vulnerabilities were discovered
17%
06.10.2019
);
19 printf("source: %s\ntarget: %s\n",source,target);
20 return 0;
21 }
Figure 3: Splint warns the programmer of a likely out