Home Search
applications - search results
If you're not happy with the results, please do another search
With Azure Container Service, Microsoft Works to Make Container Management Boring
Earlier this week, Microsoft made the Kubernetes container orchestration service generally available on Azure Container Service, alongside the other predominant container orchestration engines Docker Swarm and Mesosphere’s Data Center Operating...
Linux Security Fundamentals Part 6: Introduction to nmap
Start exploring Linux Security Fundamentals by downloading the free sample chapter today. DOWNLOAD NOW
In last week’s tutorial, we tried out tcpdump and wireshark, two of the...
Persistent Memory Usage in Linux
In most cases, when a machine crashes or fails, we lose whatever we had loaded into memory, which for some applications can result in...
Engineer Finds Passion and Community With Kids On Computers
If you love technology, you can find a space for yourself and connect with others around mutual interests, according to Avni Khatri, president of...
How to install Arch Linux on VirtualBox
Arch Linux is a Linux-based operating system that is designed for i689 and 86-64 computers. Its unique package manager is responsible for providing updates...
How China Mobile Is Using Linux and Open Source
China Mobile is one of the biggest telecom companies in the world, with more than 800 million users in China -- all of whom...
5 Videos to Get You Pumped to Speak at MesosCon 2017
Last year, experts from Uber, Twitter, PayPal, and Hubspot, and many other companies shared how they use Apache Mesos at MesosCon events in North...
Distributed Logging for Containers
The era of microservices calls for a new approach to logging with built-in infrastructure for both aggregation and storage. Multiple applications running in isolated...
Evolution of Business Logic from Monoliths through Microservices, to Functions
The whole point of running application software is to deliver business value of some sort. That business value is delivered by creating business logic...
Linux Security Fundamentals Part 5: Introduction to tcpdump and wireshark
Start exploring Linux Security Fundamentals by downloading the free sample chapter today. DOWNLOAD NOW
In this exercise, we learn about two of the most useful tools for...





