Articles

Lead Image © Heiko Küverling, 123RF.com

Lead Image © Heiko Küverling, 123RF.com

Using the MQTT IoT protocol for unusual but useful purposes

Although the MQTT protocol is usually associated with the Internet of Things, it also works in some very different situations, such as monitoring, for example.
Lead Image © Jason Murillo, 123RF.com

Lead Image © Jason Murillo, 123RF.com

VM and cloud management with openQRM

OpenQRM is a web-based, open source, data center management and cloud platform that offers many popular Linux tools with no major configuration overhead. We show you how to use it.
Lead Image © Sergey Nivens, 123RF.com

Lead Image © Sergey Nivens, 123RF.com

Improving Docker security now and in the future

The focus for container solutions such as Docker is increasingly shifting to security. Some vulnerabilities have been addressed, with plans to take further steps in the future to secure container virtualization.
Lead Image © Ulrich M ller, 123RF.com

Lead Image © Ulrich M ller, 123RF.com

Magnum: Exploring OpenStack's Container API

The Magnum project brings Docker container technology to the OpenStack cloud.
Lead Image © Maksim Kabakou, 123RF.com

Lead Image © Maksim Kabakou, 123RF.com

Build secure IoT applications with open source

We look at some common sense tips and open source tools for securing IoT devices.
Lead Image © Galina Peshkova, 123RF.com

Lead Image © Galina Peshkova, 123RF.com

The advantages of configuration management tools

Etcd, ZooKeeper, Consul, and similar programs are currently the subject of heated debate in the world of configuration management. We investigate the problems they seek to solve and promises they make.
Lead Image © Sergey Nivens, 123RF.com

Lead Image © Sergey Nivens, 123RF.com

Set up and operate security monitoring throughout the enterprise

We describe some basic considerations for choosing a Security Information and Event Management system and designing its implementation.
Lead Image © Andrii IURLOV, 123RF.com

Lead Image © Andrii IURLOV, 123RF.com

Advanced Windows security using EMET

Although attacks on computers are numerous and varied, they are predominantly based on the same techniques. Microsoft closes these vulnerabilities on Windows computers using the Enhanced Mitigation Experience Toolkit (EMET).
Lead Image © silvae, 123RF.com

Lead Image © silvae, 123RF.com

Working with the Exchange Management Shell

We take a close look at the Exchange Management Shell – an essential tool for Exchange administrators.
Lead Image © Oleksiy Mark, 123RF.com

Lead Image © Oleksiy Mark, 123RF.com

Application virtualization with Docker

Half-lives of products are becoming shorter and shorter on today's virtualization market. This year, the buzz is all about Docker.