News Category: Networking

How to allows incremental file sync for many users on Linux

Suppose you as a software developer has set up daily builds of your software for testing purposes. Every day you make a new build, users have to re-download the updated build to evaluate it. In this case you may want to enable differential downloads, so that users can download only difference...
Read 0 Comments

Shared Hosting on your Web Server: Multiple virtual hosts

This article tends to help you to set up multiple websites (or virtual hosts) on single web server running on Linux. It's particularly useful if you don't want to spend money on multiple Virtual Private Servers (VPS), but you'd like to have ability to run and build multiple websites with minimum...
Read 1 Comments

windows-ubuntu.png

windows-ubuntu
Bash on Windows brings the Linux command-line to Windows.

Bash on Windows: What Does It Mean?

As the enterprise landscape is changing -- in favor of Linux and open source -- companies like Microsoft are embracing Linux. Most recently, Microsoft announced support for the Unix Bash shell on Windows, providing developers and administrators with an important tool for managing Unix and Linux...
Read 8 Comments

One of GNU/Linux’s Most Important Networking Components Just Got an Update

NetworkManager 1.2 debuts with improved security, Wi-Fi usability and more. The software framework that powers the network connections on many GNU/Linux systems just got its second major update in less than a year and a half, with the version 1.2 release of NetworkManager.  Version 1.2 brings...
Read 0 Comments

5 Features to Look For In A Next-Generation Firewall

Sure, the term next-generation firewall (NGFW) has been around since 2007 and the vendors have been hyping these products for a close to a decade. So what’s new this year? Adam Hils, research director, network security, at Gartner, says what’s different about today’s NGFWs is the integration of...
Read 0 Comments

kibana.png

Once your first data has been sent to logstash, it is then possible to create your first index by logging into kibana.
ELK, which stands for Elasticsearch + Logstash + Kibana, is one of the most standard solutions to collect and search logs.

How to Manage Logs in a Docker Environment With Compose and ELK

The question of log management has always been crucial in a well managed web infrastructure. Well managed logs will, of course, help you monitor and troubleshoot your applications, but it can also be source of information to know more about your users or investigate any eventual security incidents...
Read 3 Comments

Why Parallelism?

"As clock speeds for CPUs have not been increasing as compared to a decade ago, chip designers have been enhancing the performance of both CPUs, such as the Intel Xeon and the Intel Xeon Phi coprocessor by adding more cores. New designs allow for applications to perform more work in parallel,...
Read 0 Comments

machinelearning-meyer.png

machine-learning
Recent Advances in Machine Learning and Their Application to Networking - Dave Meyer, Brocade

Machine Learning and AI Coming Soon to Networking [Video]

Machine learning and artificial intelligence have gained notoriety among the general public through applications such as Siri, Alexa or Google Now. But, beyond consumer applications, these new hot areas of innovation are bringing unbelievable benefits to the different components of IT...
Read 0 Comments

DRAM Bitflipping Exploits That Hiijack Computers Just Got Easier

New research into the "Rowhammer" bug that resides in certain types of DDR memory chips raises a troubling new prospect: attacks that use Web applications or booby-trapped videos and documents to trigger so-called bitflipping exploits that allow hackers to take control of vulnerable computers. The...
Read 0 Comments

Tech Coalitions Pen Open Letter to Burr and Feinstein Over Bill Banning Encryption

A group of tech coalitions has written an open letter to Senators Richard Burr (R-N.C.) and Dianne Feinstein (D-Calif.), concerning their bill requiring all encryption to be breakable on command, which achieved infamy in record time following the leak of a draft earlier this month. The highly...
Read 0 Comments

Pages

Click Here!