Articles

Computer Cop  

Machine learning can address risks and help defend the IT infrastructure by strengthening and simplifying cybersecurity.

The Right Tools  

If you use IIS on Windows servers, you can fully access the web server's features and manage it effectively with on-board tools, including the well-known Internet Information Services (IIS) Manager, Windows Admin Center, and PowerShell.

Pushbutton  

Red Hat delivers an installer that lets you automate the installation of RHEL and CentOS in a preboot execution environment.

Build by Number  

The basic container images on which you base your work can often be out of date. We show you how to solve this problem and create significantly leaner containers.

The Streamer  

Apache Kafka reads and writes events virtually in real time, and you can extend it to take on a wide range of roles in today's world of big data and event streaming.

Fluent  

Pulumi promises a unified interface and surface for orchestrating various clouds and Kubernetes.

Replacements  

The FIDO and FIDO2 standard supports passwordless authentication. We discuss the requirements for the use of FIDO2 and show a sample implementation for a web service.

Authorization Center  

Identity and access management plays a central role in modern IT infrastructures, with its local resources, numerous applications, and cloud services. We investigate how OpenIAM implements centralized user management.

Optimized Throughput  

Filtering HTTP connections and employing traditional proxy servers can protect users from web threats but also increase latency. DNS filters would be a better option, but they lacked authentication – until NxFilter came along.

All Yours  

A private Docker registry gives you more control over images and protects your Docker Hub credentials.
Powered by eZ Publish™ CMS Open Source Web Content Management. Copyright © 1999-2014 eZ Systems AS (except where otherwise noted). All rights reserved.