Advanced search
Search all the words
Search the exact phrase
Published
Any time
Last day
Last week
Last month
Last three months
Last year
Display per page
5 items
10 items
20 items
30 items
50 items
Search for "" returned 4528 matches
Taking Control
123RF_71073869_Leading-Camels_ffzhang_resized.png
The Ralph open source asset management system and configuration database keep things simple when it comes to managing data centers, but without compromising flexibility.
Single Stack
123RF_124293864_Computer-Monitoring_peshkov_resized.png
The open source Graphite tool offers real-time monitoring for IT environments, with comprehensive and fast data collection from virtually any system.
Cloud Contact
PO-23913-123RF-Rungaroon_TAWEEAPIRADEEMUNKONG_123RF-Cloud_resized.png
Manage your on-premises servers with Windows Admin Center in Azure.
Technology Predictions for 2024 and Beyond
123rf_27942379_Monitor_rendeeplumia_resized.png
I must admit that I really hate it when I read industry pundit predictions for the next year.
Keeping a Close Watch
PO-26294-123RF-Brian_Jackson_123RF-Laptop_and_Video_Camera_resized.png
We show you how monitoring your sensitive IT systems can be a more secure experience.
Guardian Angel
PhotobyRaynerSimpsononUnsplash_Guardian-Angel.png
The OSSEC free intrusion detection and host-based intrusion prevention system detects and fixes security problems in real time at the operating system level with functions such as log analysis, file integrity checks, Windows registry monitoring, and rootkit detection. It can be deployed virtually anywhere and supports the Linux, Windows, and macOS platforms.
Special Ops
bambamstiger_Fotolia-sync.png
GitOps applies DevOps practices through infrastructure automation of version control repositories. We look at why it is so popular and why it is often used in the context of Kubernetes.
One Against All
PhotobyArisaChattasaonUnsplash_boxing-gloves.png
Targeted attacks such as distributed denial of service, with thousands of computers attacking your servers until one of them caves in, cannot be prevented, but they can be effectively mitigated.
Command and Control
123RF_135919753_Abstract-Computer_peshkova_resized.png
Create your own command center in small infrastructures or test environments with flexible dashboards that control and monitor relevant applications and services.
Inspector
PhotobymarilezhavaonUnsplash.png
Vulnerable software and incorrect settings cause problems, but administrators have some tools at hand that can help with container security.
« Previous
Next »
1
...
373
374
375
376
377
378
379
380
381
382
383
384
385
386
...
453
Powered by
eZ Publish™ CMS Open Source Web Content Management
. Copyright © 1999-2014
eZ Systems AS
(except where otherwise noted). All rights reserved.