Frontpage
Navigation
Advanced search
Search all the words
Search the exact phrase
Published
Any time
Last day
Last week
Last month
Last three months
Last year
Display per page
5 items
10 items
20 items
30 items
50 items
Search for "" returned 4528 matches
Tech News
Microsoft_Azure_Logo.png
News for system administrators around the world.
Medicine Cabinet
123RF_50032489_Pharmacy-bottles_sensay_resized.png
WSUS simplifies updating Windows 10 computers over the network, but first, you need to modify some settings and add new Group Policy templates to insure successful installation of the updates.
Interaction
Dmitriy_Melnikov_Fotolia-Snails.png
The OpenStack cosmos cannot ignore the trend toward containers. If you want to combine both technologies, projects like Magnum, Kolla, and Zun come into play. Which one?
On the DVD
Fedora Server 26 is a Red Hat-sponsored, community-based distro that serves as a test bed for technologies. Endian Firewall 3.2.4 gives you all you need to turn your own computer into a firewall appliance.
Welcome
123rf_10846135_Red-shipping-container-with-crane_zentilia_resized.png
For 16 years, I worked for a very large international support company, mostly as a system administrator. For those 16 years, I found that the fine art of negligence was not only prevalent, but an actual and conscious career choice for some of my colleagues.
It's a Snap!
PO-26470-123RF-Amawasri_Naksakul_123RF-Pea_Pods_with_Workers_resized.png
Canonical's Snapcraft (Snappy) package manager creates a self-contained application that works across Linux distributions. We show you how to install, publish, and run a simple snap.
The Pure Doctrine
Michal_Bednarek_123RF-Meditation_at_Sunset.png
Internet providers often market their open interfaces as RESTful, but is this true of the APIs, especially when no standard exists? We introduce some REST providers and look at how closely their API architectures reflect the REST principle.
Tech News
AlmaLinux 8.5 Now Available For PowerPC Hardware
Bad Actor
PhotobyKyleHeadonUnsplash_Actors.png
Three IAM security misconfiguration scenarios are rather common: allowing the creation of a new policy version, the modification of a role trust policy, and the creation of EC2 instances with role passing. We look at ways to avoid and detect IAM security holes.
Footloose
PhotobyErikOdiinonUnsplash_Footloose.png
Keep your test-driven development and testing environments pristine with Footloose containers that look like VMs.
« Previous
Next »
1
...
289
290
291
292
293
294
295
296
297
298
299
300
301
302
...
453