Articles

Lead Image © Dietmar Hoepfl, 123RF.com

Lead Image © Dietmar Hoepfl, 123RF.com

Windows Admin Center for managing servers and clients

Windows Admin Center consolidates Windows Server admin tools into a browser-based remote management app for physical, virtual, and on-premises servers, although it does not yet fully replace Server Manager.
Lead Image © Ildar Galeev, 123RF.com

Lead Image © Ildar Galeev, 123RF.com

Network traffic utilities bandwhich and iftop

A close look at the network traffic on a server with the bandwhich and iftop utilities can reveal exactly why an application is behaving strangely.
Lead Image © Freya Sapphire, Photocase.com

Lead Image © Freya Sapphire, Photocase.com

Stressing security with PowerShell

PowerShell is not the usual go-to tool for pentesting, but it can reveal IT vulnerabilities that suggest a more considered use of the tool.
Lead Image © leeavison, 123RF.com

Lead Image © leeavison, 123RF.com

Run TensorFlow models on edge devices

TensorFlow Lite on a mobile device predicts harvest time for a real-world vertical farming operation.
Lead Image © Zachery Blanton, 123RF.com

Lead Image © Zachery Blanton, 123RF.com

Secure access to Kubernetes

Kubernetes comes with a sophisticated system for ensuring secure access by users and system components through an API. We look at the options for authentication, authorization, and access control.
Lead Image © Franck Boston, Fotolia.com

Lead Image © Franck Boston, Fotolia.com

Export and analyze Azure AD sign-in and audit logs

The relevant sign-in and audit logs in Azure Active Directory can be exported to external data sources to provide not only long-term archiving, but also the freedom to analyze the stored data.
Lead Image © vesuv, photocase.com

Lead Image © vesuv, photocase.com

Building a low-powered NAS

Build a network-attached storage box with Rockstor to manage your data.
Photo by James Pond on Unsplash

Photo by James Pond on Unsplash

Mesh Service for OSI Layers 2 and 3

In early April 2018, the Cloud Native Computing Foundation accepted a new sandboxing project: Network Service Mesh. In this article, we explain how it resembles a conventional service mesh and what makes it different.
Lead Image © amasterpics123, 123RF.com

Lead Image © amasterpics123, 123RF.com

Identity Governance regulates access control in Azure AD

Azure Active Directory Identity Governance brings security processes to organizations with users who access resources or collaborate with partners in the cloud.
Lead Image © Petr Vaclavek, 123RF.com

Lead Image © Petr Vaclavek, 123RF.com

Secure your data channel with stunnel

Stunnel provides a TLS wrapper with extensive configuration options to secure your data over insecure wireless networks.