Advanced search


Replacements  

The FIDO and FIDO2 standard supports passwordless authentication. We discuss the requirements for the use of FIDO2 and show a sample implementation for a web service.

Buffer Zone  

Container technology security is not well defined. We look at several approaches to closing this security gap with hypervisors and buffer zones.

Authorization Center  

Identity and access management plays a central role in modern IT infrastructures, with its local resources, numerous applications, and cloud services. We investigate how OpenIAM implements centralized user management.

The Right Tools  

If you use IIS on Windows servers, you can fully access the web server's features and manage it effectively with on-board tools, including the well-known Internet Information Services (IIS) Manager, Windows Admin Center, and PowerShell.

Speed Limits  

You have parallelized your serial application, but as you use more cores you are not seeing any improvement in performance. What gives?

Blade Runner  

We examine some mathemagical tools that approximate time-to-execute given the parallelizable segment of code.

Conversion Work  

After about two years of development, version 8 of the popular PHP scripting language has been released. It comes with a number of innovations and ditches some obsolete features

Playing with Blocks  

Enable and share performant block devices across a network of compute nodes with the RapidDisk kernel RAM drive module.

Small Wonders  

The lax syntax verification of shell scripts and a lack of attention to detail in programming can create impressively dangerous security vulnerabilities.

Trick or No Trick  

By using the LD_PRELOAD environment variable, you can improve performance without making changes to applications.
Powered by eZ Publish™ CMS Open Source Web Content Management. Copyright © 1999-2014 eZ Systems AS (except where otherwise noted). All rights reserved.