79%
15.02.2018
-Based Deployment
- name: add correct apt repo
become: yes
apt_repository:
repo: deb [arch=amd64] https://download.docker.com/linux/ubuntu {{lsb_release_output.stdout}} stable
state: present
79%
08.10.2015
volumes of data. Spark [7] even claims to perform 10 to 100 times faster than Hadoop.
Infos
Apache Storm: http://storm.incubator.apache.org/downloads.html
Storm Starter Scripts: https://github.com
79%
20.03.2014
the Secure flag, which is a tradeoff between client speed and security, the HttpOnly flag should always be enabled unless it needs to be disabled for functionality. In Figure 7, there is no HttpOnly flag
79%
07.06.2019
better system protection, you can set the node monitor to "respawn" if it ever shuts down for any reason (notification email is recommended).
The OS for the test environment is Red Hat Enterprise Linux 7
79%
06.10.2019
The end of the road is nothing like nigh for Google's Kubernetes container orchestrator, reflected not least in sheer numbers: The May 2019 KubeCon saw 7,700 participants. Clearly, no manufacturer
79%
13.06.2016
additional protection: Since the version 44 Nightly build, sites loaded via HTTP containing a password field () have been marked as insecure starting October 20, 2015 [7
79%
25.09.2023
another pod with the four AWX containers. The service directs the nodeport into the application. In an OpenShift or MicroShift setup, you can also create the route (Listing 7).
Listing 6
AWX
79%
09.01.2013
custom Debian packages, of which you need to install opennebula-common, libopennebula-ruby, and their dependencies. The tutorial [7] provides competent help if Ruby warnings happen to stop the installation
79%
05.02.2023
in Windows 10 from the German Federal Office for Information Security [5]
Center for Internet Security benchmarks [6]
US Department of Defense Security Technical Implementation Guide [7]
Australian
79%
30.05.2021
and changing passwords), that situation must be planned carefully, and you need controls in place and some detection mechanism. The AWS documentation [7] lists the variables that could be used in policies (Table