Articles from ADMIN Issue 61
The basic container images on which you base your work can often be out of date. We show you how to solve this problem and create significantly leaner containers.
The FIDO and FIDO2 standard supports passwordless authentication. We discuss the requirements for the use of FIDO2 and show a sample implementation for a web service.
Machine learning can address risks and help defend the IT infrastructure by strengthening and simplifying cybersecurity.
Google and Facebook are two of the biggest providers for single sign-on on the web, with OAuth2 and OpenID, but if you don't want to put your customers' or employees' data in their hands, Red Hat's Keycloak software lets you run your own operations with the option of integrating existing Kerberos or LDAP accounts.
Red Hat delivers an installer that lets you automate the installation of RHEL and CentOS in a preboot execution environment.
Teler is an intrusion detection and threat alert command-line tool that analyzes logs and identifies suspicious activity in real time.
Most Internet services require password-protected individual accounts. A password manager can help you keep track of all your access credentials.
You have parallelized your serial application, but as you use more cores you are not seeing any improvement in performance. What gives?
If you use IIS on Windows servers, you can fully access the web server's features and manage it effectively with on-board tools, including the well-known Internet Information Services (IIS) Manager, Windows Admin Center, and PowerShell.
We examine some mathemagical tools that approximate time-to-execute given the parallelizable segment of code.