Advanced search


Bouncer  

Teleport centrally manages logins against various protocols, including SSH, Kubernetes, and databases. Functions such as two-factor authentication are included in the scope of delivery, as is management of your own certificates.

Is It Real?  

Trust is good, but controls are better. As more flexible working models become widespread, the boundaries of the classic perimeter are blurring and softening existing models of trust for adopting cloud software and data storage or running domain controllers or core applications in the cloud.

Peak Performance  

Many HPC systems check the state of a node before running an application, but not very many check that the performance of the node is acceptable before running the job.

Refreshed  

Ceph developers focus on getting rid of historic clutter and adding new features for improved performance and built-in automation.

Building Plans  

Rancher has set up shop as an agile alternative to Red Hat OpenShift as an efficient way to manage Kubernetes clusters. In terms of the architecture, a Rancher setup differs significantly from classic Kubernetes.

Hidden Treasures  

The libiotrace library monitors running, static and dynamically linked programs and collects detailed data for many file-I/O-related function calls.

New Targets  

Files encrypted by ransomware have been the nightmare scenario of IT departments, and even specialized operating systems like the ESXi server are not immune. We look at how to mitigate risk and prepare for recovery if hypervisor protection fails.

Welcome  

No, you're not mistaken and not imagining things. I've written about the Great Resignation, the Great Stay Put, and now the Great Layoff.

Temporary Admin  

Azure AD is one of the most important authentication services for cloud environments. We show you how to delegate authorizations in Azure AD to ensure better security.

Pulling the Plug  

The SHA-1 cryptographic hash function has been considered insecure for a long time. Some Linux distributions have banned or no longer use it – with some consequences, though.
Powered by eZ Publish™ CMS Open Source Web Content Management. Copyright © 1999-2014 eZ Systems AS (except where otherwise noted). All rights reserved.