Advanced search
Search all the words
Search the exact phrase
Published
Any time
Last day
Last week
Last month
Last three months
Last year
Display per page
5 items
10 items
20 items
30 items
50 items
Search for "" returned 4528 matches
Bouncer
123RF_134944790_AndriyPopov_Security_resized.png
Teleport centrally manages logins against various protocols, including SSH, Kubernetes, and databases. Functions such as two-factor authentication are included in the scope of delivery, as is management of your own certificates.
Is It Real?
PhotobyJeffreyDungenonUnsplash_Camel-Illusion.png
Trust is good, but controls are better. As more flexible working models become widespread, the boundaries of the classic perimeter are blurring and softening existing models of trust for adopting cloud software and data storage or running domain controllers or core applications in the cloud.
Peak Performance
123rf_62145976_Gaussian-curve_PeterHermesFurian_resized.png
Many HPC systems check the state of a node before running an application, but not very many check that the performance of the node is acceptable before running the job.
Refreshed
PhotobyYannicLaderachonUnsplash_Yoga.png
Ceph developers focus on getting rid of historic clutter and adding new features for improved performance and built-in automation.
Building Plans
123RF_13719109_Architecture-Plans_FranckBoston_resized.png
Rancher has set up shop as an agile alternative to Red Hat OpenShift as an efficient way to manage Kubernetes clusters. In terms of the architecture, a Rancher setup differs significantly from classic Kubernetes.
Hidden Treasures
PhotobyNadjibBRonUnsplash_Treasure.png
The libiotrace library monitors running, static and dynamically linked programs and collects detailed data for many file-I/O-related function calls.
New Targets
PhotobyAfifRamdhasumaonUnsplash_Target.png
Files encrypted by ransomware have been the nightmare scenario of IT departments, and even specialized operating systems like the ESXi server are not immune. We look at how to mitigate risk and prepare for recovery if hypervisor protection fails.
Welcome
123RF_190016363_Database-Cloud_DaniilPeshkov_1_resized.png
No, you're not mistaken and not imagining things. I've written about the Great Resignation, the Great Stay Put, and now the Great Layoff.
Temporary Admin
lassedesignen_123rf-Muscle_Man.png
Azure AD is one of the most important authentication services for cloud environments. We show you how to delegate authorizations in Azure AD to ensure better security.
Pulling the Plug
123rf_186886022_plug_destinacigdem_resized.png
The SHA-1 cryptographic hash function has been considered insecure for a long time. Some Linux distributions have banned or no longer use it – with some consequences, though.
« Previous
Next »
1
...
294
295
296
297
298
299
300
301
302
303
304
305
306
307
...
453
Powered by
eZ Publish™ CMS Open Source Web Content Management
. Copyright © 1999-2014
eZ Systems AS
(except where otherwise noted). All rights reserved.