17%
02.02.2021
developed by the career platform LinkedIn to process massive volumes of data in real time. Today, Kafka is used by more than 80 percent of the Fortune 100 companies, according to the project's own information ... Apache Kafka reads and writes events virtually in real time, and you can extend it to take on a wide range of roles in today's world of big data and event streaming.
17%
10.06.2015
achieve redundancy far less expensively by opting for Linux and the Fault Tolerant (FT) Router [1].
A Linux host typically sends its packets with the help of a routing table. All packets that do not belong ... The Fault Tolerant Router daemon uses multipath routing among multiple Internet connections to keep you connected, even when some connections go down.
16%
13.02.2017
with dedicated servers and combinations of SSDs and traditional hard drives. Usually, the components connect with each other and the clients over a 10Gb network.
However, SDS now also provides added value ... shows which operations each system is best at tackling.
16%
05.12.2016
to perform the setup manually on each device.
OpenVPN Client Free
Android from 4.0
Colucci https://play.google.com/store/apps/details?id=it.colucciweb.free.openvpn&hl=en
Open ... Smartphones and tablets using hotspots and mobile data connections are susceptible to spying. iOS and Android each supply a tunneled VPN connection out of the box. We take a look at their apps
16%
03.12.2015
by the width of the level – the cost per gigabyte of each level increases, and performance decreases compared with the level above it. The data storage is also volatile until you reach the final disk layer ... Persistent memory is non-volatile data storage in DIMM format. Losing power means that you won't lose data. What is it, and how can you use it?
16%
08.10.2015
when choosing a SIEM system and designing its interaction with data sources and downstream systems.
Well-organized monitoring does not just cover classic indicators such as availability, use levels ... We describe some basic considerations for choosing a Security Information and Event Management system and designing its implementation.
16%
13.12.2011
addresses and the NameVirtualHost
is redundant. With this method, each virtual host can use its own SSL certificate. This approach is useful in practical terms if you do the same thing for IPv4, because ...
If you run a web server and a mail server and anticipate that users from Asia will access your system, it’s time to get it ready for IPv6.
16%
17.02.2015
with near real-time graphical representations using the "hard" data from your computer system, while the log services module monitors each individual active server module.
Log services and monitoring ... Some users may struggle when setting up various services, such as web servers, email servers, firewalls, and the like. Zentyal simplifies configuration of all those things, thanks to its intuitive
15%
05.12.2014
made a conscious decision to start again and effectively go back to basics with some of the core shell commands; that is, I wanted a timely way to improve my understanding of a few key packages so that I ... Now is the time to re-examine and consider again the power of grep and its relatives.
15%
14.11.2013
and resources to keep the FreeNAS project going, so he transferred control of it to iXsystems [2], a company well-known for its support of open source software in general and FreeBSD [3] in particular. A period ... We provide an overview of FreeNAS and ZFS, its main filesystem, then show how to set up and maintain a FreeNAS installation.