10%
27.03.2013
We look at the new features in Ceph version 0.56, alias “Bobtail,” talk about who would benefit from CephX Ceph encryption, and show you how a Ceph Cluster can be used as a replacement for classic ... released Ceph 0.56, code-named “Bobtail,” in January 2013, promising the user vastly improved performance. In terms of the configuration file, there are some CephX-related changes: whereas in Ceph 0.47 you ...
We look at the new features in Ceph version 0.56, alias “Bobtail,” talk about who would benefit from CephX Ceph encryption, and show you how a Ceph Cluster can be used as a replacement for classic
10%
04.08.2020
protocols for individual or all users (network application control). Therefore, you can block bandwidth-intensive applications such as Torrent and prevent data being uploaded to cloud applications
10%
25.09.2023
your auto-healing servers once you throw the open source and dirt cheap M/Monit into the picture.
Infos
Monit: https://mmonit.com/monit/
Code for this article: https://linuxnewmedia.thegood.cloud
10%
04.08.2020
://cassandra.apache.org
Apache TinkerPop: http://tinkerpop.apache.org
RDF: https://www.w3.org/RDF
Gremlin Console: https://github.com/tinkerpop/gremlin/wiki/Downloads
Neo4j sandbox: https://www.neo4j.com/sandbox
Nomen
10%
04.10.2018
of latency. Edge and fog computing demand a faster response.
TLS 1.3 delivers with 0-RTT session resumption. This quick procedure is at least as thrilling as the original no-frills handshake, if not more so
10%
28.11.2023
: https://docs.docker.com/scout/
Clair: https://github.com/quay/clair
mysqldump: https://dev.mysql.com/doc/refman/8.0/en/mysqldump.html
Selenium: https://www.selenium.dev/
Postman: https://www.postman.com
10%
06.10.2019
that describe the ideal state of systems and let you check that the state is maintained are helpful, although they do not detect vulnerabilities in applications, such as coding errors. Precisely these errors can
10%
01.06.2024
compromise system security.
However, are current cybersecurity best practices enough?
In short, the answer is "no." History teaches that exploitable vulnerabilities always surface, and even the most
10%
09.08.2015
Community Edition, Commercial Version
Open Source Edition, Enterprise Edition
Open Source Edition
SaaS model
Via partners, Hosting Edition
Cloud Edition
No
10%
03.08.2023
.168.2.2"
}, {
"name": "domain-search",
"data": "mydomain.example.com, example.com"
}],
"subnet4": [{
"subnet": "192.168.2.0/24",
"pools": [{"pool":"192.168.2.1 - 192.168.2.50"}],
"option-data": [{
"name