search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%xcode%3
?
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(67)
Article
(9)
News
(8)
Keywords
« Previous
1
2
3
4
5
6
7
8
9
55%
Vector databases for data-driven artificial intelligence
04.12.2024
Home
»
Archive
»
2024
»
Issue 84: Non-R...
»
designed to find dense vector similarities efficiently. Vespa [
3
] is a fully featured search engine and vector database that supports approximate nearest neighbor (ANN) vector searches, lexical searches
55%
Run rootless Podman containers as systemd services
26.01.2025
Home
»
Archive
»
2025
»
Issue 85: Monit...
»
container images, and podman pull nginx:alpine downloads the nginx:alpine image from one of the registered container repositories. A Podman Compose [
3
] solution also processes docker-compose.yml files
55%
Storage trends for taming the flood of data
27.09.2024
Home
»
Archive
»
2024
»
Issue 83: Storage
»
: the Zenoh data protocol [
3
]. This network protocol is expected to play a similarly important role in data transport to IP in the development of the Internet as Kafka does today for real-time data streaming
55%
ASM tools and strategies for threat management
26.01.2025
Home
»
Archive
»
2025
»
Issue 85: Monit...
»
of vulnerabilities, so they can be analyzed and continuously monitored. Gartner [
3
] includes Armis, Axonius, Balbix, JupiterOne, Lansweeper, OctoXLabs, runZero, and ThreatAware in its list of CAASM providers
« Previous
1
2
3
4
5
6
7
8
9