13%
29.09.2020
-line operations.
To install Dockly [3], you can choose one of two routes: with npm (see the "Installation by npm" box for that route) and in a Docker container. For context, on my laptop, about 43MB of file space
13%
09.10.2017
and interactions.
Zun
The Zun project has only been around for about a year. Its goal is to provide an interface for managing containers as native OpenStack components (e.g., like Cinder, Neutron, or Nova). Thus
13%
18.07.2013
CeBIT's focus on the "Cloud" in 2011 prompted many cloud providers to launch new business models, and new cloud products in particular sprouted like mushrooms in 2012. This year, the use of cloud
13%
16.05.2013
Samba 4 is an important milestone for the entire IT world with its new Active Directory (AD) functionality. Originally, Samba primarily provided file and print services using the SMB/CIFS protocol
13%
05.12.2016
.
Cluster To Go
After the install, you can set up a test environment in the blink of an eye: (1) select a Kubernetes provider and (2) fire up the cluster:
export KUBERNETES_PROVIDER=libvirt-coreos
cluster
13%
11.10.2016
support for its NX-OS and IOS devices with specially provided puppet devices.
The feature scope of the Cisco module for Puppet is pretty impressive: It can adapt practically any important
13%
14.08.2017
for the handling Trove correctly in everyday life.
Performance
Database performance, in particular, causes headaches for cloud providers for obvious reasons: Whereas databases in conventional setups are regularly
13%
04.10.2018
(IDaaS) providers such as Okta help lower the barrier of inconvenience by integrating with on-premises LDAP and Active Directory servers, allowing the master directory to remain unchanged while providing
13%
05.12.2019
no longer afford this kind of redundancy. Deepshore provides an alternative concept that draws on blockchain as an important component in its implementation and thus adds often-missed value to the overall
13%
25.03.2020
-bit random number, intended to ensure the assignment of the request and response, provides rudimentary protection. The requesting client accepts the first incoming response with the correct random