Articles

Lead Image © damedeeso,123rf.com

Lead Image © damedeeso,123rf.com

Manage cluster state with Ceph dashboard

The Ceph dashboard offers a visual overview of cluster health and handles baseline maintenance tasks; with some manual work, an alerting function can also be added.
Photo by CHUTTERSNAP on Unsplash

Photo by CHUTTERSNAP on Unsplash

Persistent storage management for Kubernetes

The container storage interface (CSI) allows CSI-compliant plugins to connect their systems to Kubernetes and other orchestrated container environments for persistent data storage.
Photo by Erda Estremera on Unsplash

Photo by Erda Estremera on Unsplash

U-Move backs up, restores, and migrates Active Directory environments

U-Tools Software's U-Move promises significantly simplified backups and restores of Microsoft's directory service in the event of a disaster, during migrations, and when setting up test environments.
Photo by Alan on Unsplash

Photo by Alan on Unsplash

Updating Docker containers with Watchtower

Automatically update software in the Docker universe with Watchtower.
Lead Image © Tsung Lin Wu, 123RF.com

Lead Image © Tsung Lin Wu, 123RF.com

Public key infrastructure in the cloud

A public key infrastructure in the cloud for secure digital communication maintains the security of an on-premises solution and reduces complexity.
Photo by Iwona Castiello d'Antonio on Unsplash

Photo by Iwona Castiello d'Antonio on Unsplash

App Proxy support for Remote Desktop Services

Support flexible working environments with Remote Desktop Services and Azure AD Application Proxy.
Photo by Sahand Babali on Unsplash

Photo by Sahand Babali on Unsplash

Flexible software routing with open source FRR

The FRR open routing stack can be integrated into many networks because it supports a large number of routing protocols, though its strong dependence on the underlying kernel means it requires some manual configuration.
Lead Image © chachar, 123RF.com

Lead Image © chachar, 123RF.com

Build system images with Kiwi

Configure, build, and deploy operating system images in a suitable format to facilitate and accelerate the installation of new systems.
Photo by Jorge Fernández Salas on Unsplash

Photo by Jorge Fernández Salas on Unsplash

Best practices for secure script programming

The lax syntax verification of shell scripts and a lack of attention to detail in programming can create impressively dangerous security vulnerabilities.
Photo by Markus Spiske on Unsplash

Photo by Markus Spiske on Unsplash

Fast and scalable ownCloud Infinite Scale

A complete rebuild of ownCloud delivers the speedy and scalable ownCloud Infinite Scale file platform.