Articles from ADMIN Issue 75
Develop resilient and efficient cloud infrastructures for enterprise applications with the AWS Well-Architected Framework. We show you how to implement the solutions from the framework in practical terms by providing an introduction to the AWS Well-Architected tool with an example.
Microsoft Azure Sphere links three vital elements of the Internet of Things – microcontrollers, software, and cloud service – with a focus on security.
The Gophish phishing framework lets you set up your own phishing campaigns to identify vulnerabilities and make users aware of these dangers.
Usernames and passwords play an important role in security. In this article, we show you how to set up the KeePass password manager and keep it synchronized across multiple devices.
Histograms are a proven means of displaying latencies in Prometheus, but until now, they have had various restrictions. Native histograms now provide a remedy.
OpenProject supplies sensible, comprehensive project management for SMEs with few financial inputs.
Zabbix provides comprehensive, highly configurable, but easy-to-use system monitoring.
The canary in a coal mine has made its way metaphorically into IT security with the OpenCanary honeypot for detecting attacks.
Discover the sensors that already exist on your systems, learn how to query their information, and add them to your metrics dashboard.
Standard loads are essential to benchmarking.