Frontpage
Navigation
Advanced search
Search all the words
Search the exact phrase
Published
Any time
Last day
Last week
Last month
Last three months
Last year
Display per page
5 items
10 items
20 items
30 items
50 items
Search for "" returned 4528 matches
Secure Transfer
Sergey_Nivens_123RF-Computer_Security.png
Team members often need certain information to authenticate against servers. You don't want to save this secret data in plain text, but you don't want to retype it every time, either. How can you share these secrets?
Tech News
Electron app vulnerability, WordPress sites infected by malware, Torvalds calls Intel's patch garbage, AMT flaw in Intel chips allows attacker to create a backdoor, and first malware for Mac OS in 2018.
Cloud Config
PhotobyadrianonUnsplash_205469_Cloud.png
Sure you've heard about Amazon Web Services, but have you tried it? This article shows how to configure a web server and mirrored back-end database for a small-to-midsized business environment.
Operation Pushbutton
Iaroslav_Neliubov_123RF-Finger_button.png
Jira, Confluence, and GitLab are very popular DevOps tools and often form the basis for agile work flows. With the right Ansible playbooks, Ubuntu can be turned into an agile work center.
Welcome
I'm sure I'm not the only one holding an $800+ mobile phone that will be obsolete in two years. You know, just in time for the contract to run out. Technology has a very short shelf life. I don't like that aspect of very expensive technology. I have an iPhone 7, but now the iPhone 8 and the iPhone X are both available. There's a lot of pressure to have the latest and greatest model of cell phone, tablet, and computer. Who can afford to upgrade once a year when new models hit the market?
The Lay of the Land
PhotobyMichalKmetonUnsplash.png
If you compile software on an expensive supercomputer, it's a good idea to select the languages and compilers with particular care. We report on the tried-and-proved tools used on SuperMUC, a supercomputer at the Leibniz Supercomputing Center in Germany.
Screened
PhotobyRicardoGomezAngelonUnsplashl-226886_wire-mesh.png
Containers are finding their way into business-critical environments, which is reason enough to think about how to examine the deployed container images for weak points.
On the DVD
ADMIN43_DVD_CentOS.png
CentOS describes itself as "… a community-supported distribution derived from sources freely provided to the public by Red Hat for Red Hat Enterprise Linux (RHEL)." Tails is a specialty Live Linux system designed for easy access to the TOR anonymity network.
Into the Blue
PhotobyYannickPulveronUnsplash-76163-sailboat.png
Microsoft continues to integrate Windows Server with the Azure cloud. With Cloud Witness and the RDS Connection Broker, you can operate distributed environments more reliably and efficiently, and SQL databases migrate sensibly into the cloud.
Under a Dark Cloud
PhotobyTimothyAhKoyonUnsplash_31306_Dark-Cloud-Rain.png
Offers for identity management as a service (IDaaS) are entering the market and promising simplicity. However, many lack functionality, adaptability, and in-depth integration with existing systems. We look at how IT managers should consider IDaaS in their strategy.
« Previous
Next »
1
...
323
324
325
326
327
328
329
330
331
332
333
334
335
336
...
453