Advanced search


State of the Cluster  

Log analysis can be used to great effect in HPC systems. We present an overview of the current log analysis technologies.

Light into Darkness  

Zeek offers an arsenal of scripts for monitoring popular network protocols and comes with its own policy scripting language for customization.

Stress  

A stress and benchmarking tool for websites controlled from the command line.

Good Host  

The Windows subsystem for Linux runs graphical applications on Windows 11 out of the box, and Windows Subsystem for Android, out in preview at press time, shows that Windows can be a platform for Android apps. We look at the state of the art and help you get started.

Martial Arts  

Binary analysis is an advanced technique used to work through cyberattacks and malware infestations and is also known as reverse engineering. We show you how to statically analyze binary programs with Binary Ninja, an interactive binary analysis platform.

Outliers  

The declarative PowerShell Desired State Configuration extension supports easy and transparent configuration of systems and applications. We describe the fairly complex initial setup and use of the Microsoft 365 Desired State Configuration.

Flexibility  

Demand for cloud databases continues to increase, not only because of better scalability and availability, but because of lower investment and operating costs. We'll look at some of the limitations.

Spoiled for Choice  

The Google Cloud Platform offers a wide range of different databases for various purposes.

Hide and Seek  

Legacy databases are regarded as stateful applications and, theoretically, not a good fit for containers. We reveal how classic SQL can still work well on Kubernetes and the database options available to SMEs for scale-out environments.
Powered by eZ Publish™ CMS Open Source Web Content Management. Copyright © 1999-2014 eZ Systems AS (except where otherwise noted). All rights reserved.