Articles

Set Theory  

Database administrators at the Swiss foundation Switch were increasingly encountering corrupt data, which prompted a painstaking bug hunt. The solution they found increased performance by a factor of six.

Staying on Top  

When dozens of new services and VMs emerge and disappear every day in dynamic cloud environments, conventional monitoring provides false alarms, not operational security.

On the Prowl  

Security vulnerabilities often remain unknown when the data they reveal is buried in the depths of logfiles. Apache Spot uses big data and machine learning technologies to sniff out known and unknown IT security threats.

Dig Deep  

Scout2 is an open source auditing tool that helps you keep your AWS environments secure.

Jump!  

Because the cloud is ubiquitous, some companies think that outsourcing their business applications to Amazon, Google, and the like is a breeze. In fact, on the way, treacherous winds blow just off the beaten track.

Preprogrammed  

Incorporating scripts into Group Policy can make a sys admin's job much easier.

Container Security  

Docker containers are a convenient way to run almost any service, but admins need to be aware of the need to address some important security issues.

Torque Booster  

With Windows Server 2016, tweaking the settings and taking advantage of performance monitoring tools can help boost your system's performance.

Premium Blend  

Azure Stack is an Azure extension that implements an on-premises data center for consistent hybrid cloud deployments.

Under a Dark Cloud  

Offers for identity management as a service (IDaaS) are entering the market and promising simplicity. However, many lack functionality, adaptability, and in-depth integration with existing systems. We look at how IT managers should consider IDaaS in their strategy.