Advanced search


Secure Transfer  

Team members often need certain information to authenticate against servers. You don't want to save this secret data in plain text, but you don't want to retype it every time, either. How can you share these secrets?

Cloud Config  

Sure you've heard about Amazon Web Services, but have you tried it? This article shows how to configure a web server and mirrored back-end database for a small-to-midsized business environment.

Operation Pushbutton  

Jira, Confluence, and GitLab are very popular DevOps tools and often form the basis for agile work flows. With the right Ansible playbooks, Ubuntu can be turned into an agile work center.

The Lay of the Land  

If you compile software on an expensive supercomputer, it's a good idea to select the languages and compilers with particular care. We report on the tried-and-proved tools used on SuperMUC, a supercomputer at the Leibniz Supercomputing Center in Germany.

Screened  

Containers are finding their way into business-critical environments, which is reason enough to think about how to examine the deployed container images for weak points.

On the DVD  

CentOS describes itself as "… a community-supported distribution derived from sources freely provided to the public by Red Hat for Red Hat Enterprise Linux (RHEL)." Tails is a specialty Live Linux system designed for easy access to the TOR anonymity network.

Into the Blue  

Microsoft continues to integrate Windows Server with the Azure cloud. With Cloud Witness and the RDS Connection Broker, you can operate distributed environments more reliably and efficiently, and SQL databases migrate sensibly into the cloud.

Under a Dark Cloud  

Offers for identity management as a service (IDaaS) are entering the market and promising simplicity. However, many lack functionality, adaptability, and in-depth integration with existing systems. We look at how IT managers should consider IDaaS in their strategy.