Articles

Memory  

Kubernetes is known to be inflexible when it comes to persistent storage, but Rook now offers cloud-native storage and seeks to achieve harmony.

Secret, Quick, Quiet  

The balance between IT threats and IT security is woefully unbalanced in a Windows environment, requiring the enforcement of company-wide security standards.

Fingerprints  

When you examine the memory of a computer after a break-in, take advantage of active support from the Volatility framework to analyze important memory structures and read the volatile traces of an attack.

Dreaming of Clouds  

Cloudy with a chance of better provisioning tools: The new Amazon Web Services Cloud Development Kit adds a powerful new tool to the DevOps toolkit.

Data Dance  

SQL Server runs on Linux now. We'll show you how Microsoft developers made their massive database system Linux ready, and we'll help you get started with setting up SQL Server on your own Linux system.

Shared Protection  

The Malware Information Sharing Platform lets you record and document security incidents – and share the information with users on other networks.

Bug Hunting  

We look at various extension frameworks that make the life of developers and administrators easier when debugging a script.

Quantum Computing with D-Wave  

Quantum computing used to be an esoteric thought experiment for theoretical physicists, but now it is actually starting to happen. We spoke with Murray Thom of D-Wave, a company that is leading the way to this radical new vision.

Log Inspector  

Graylog security information and event management combines real-time monitoring and immediate notification of rule violations with long-term archiving for analysis and reporting.
Powered by eZ Publish™ CMS Open Source Web Content Management. Copyright © 1999-2014 eZ Systems AS (except where otherwise noted). All rights reserved.