Advanced search
Search all the words
Search the exact phrase
Published
Any time
Last day
Last week
Last month
Last three months
Last year
Display per page
5 items
10 items
20 items
30 items
50 items
Search for "" returned 4528 matches
Special Delivery
Peapop_Fotolia-Umschlag.png
If the IT staff is having trouble keeping up with the demand for custom applications, end users can pitch in with low-code programming tools like Microsoft Power Apps.
Tech News
In the news: Red Hat Announces Ansible Lightspeed with IBM watsonx Code Assistant; Dell APEX Cloud Platform for Red Hat OpenShift Announced; NSA Offers Best Practices for OSS in Operational Technology Environments; Civil Infrastructure Platform Adds New Super-Long-Term Linux Kernel; HTTP/2 Protocol Exploited in Largest DDoS Attack Ever; Docker Announces Three New Products for Secure App Delivery; CloudBees Updates Jenkins and Offers New DevSecOps Platform; Linkerd 2.14 Released with Improved Multi-Cluster Support; NIST Releases Draft of Cybersecurity Framework v2.0; CISA and MITRE Announce Open Source Caldera for OT
Rusty Finds
PhotobyAndrewTomonUnsplash_Classic-Car.png
Ripgrep combines the best features of tools like Grep, Ack, and Silver Searcher when it comes to using search patterns in a terminal window.
Bit by Bit
Christos_Georghiou_123RF-Puzzle.png
Domain-driven design addresses many aspects of software development, from the design of entire software landscapes and the relationships between (sub)systems to the design of domain models, patterns, and code.
New Models
123RF_212307026_BrianWelker_Dodge-Challenger_resized.png
The operating system of an Azure virtual machine can be kept up to date by a number of methods; we provide an overview and look in detail at Azure Automation Update Management, the Azure Update Management Center, automation options, and other related topics.
On Call
PO-26734-123RF-Valery_Kachaev_123rf-Robot-sits-with-phone_resized.png
Event-Driven Ansible is a reactive extension that uses events to launch automations. We explain the ruleset and present examples that show how to monitor logs and call other tools.
The Hunter
123RF_212098289_ValentynIhnatkin_Velociraptor_resized.png
The software incarnation of the feared predator in the Jurassic Park movies has been on the hunt for clues to cyberattacks and indicators of compromise. We show you how to tame the beast and use it for your own purposes.
Welcome
194930945_l_normal_none.png
Consider a new direction in system administration.
Panacea
PO-26429-123RF-faithie_123RF-46494987_-_collecting_and_transforming_data_funny_illustration_with_factory_machines_processing_binary_code_resized.png
Domain-Driven transformation can refurbish a legacy system in increments while mitigating risk.
Data Depot
PhotobyCharlesForerunneronUnsplash_Depot.png
Where does your job data go? The answer is fairly straightforward, but I add some color by throwing in a little high-level background about what resource managers are doing and evolve the question to include a discussion of where data "should" or "could" go.
« Previous
Next »
1
...
380
381
382
383
384
385
386
387
388
389
390
391
392
393
...
453
Powered by
eZ Publish™ CMS Open Source Web Content Management
. Copyright © 1999-2014
eZ Systems AS
(except where otherwise noted). All rights reserved.