Home Search

applications - search results

If you're not happy with the results, please do another search

With Azure Container Service, Microsoft Works to Make Container Management Boring

Earlier this week, Microsoft made the Kubernetes container orchestration service generally available on Azure Container Service, alongside the other predominant container orchestration engines Docker Swarm and Mesosphere’s Data Center Operating...

Linux Security Fundamentals Part 6: Introduction to nmap

Start exploring Linux Security Fundamentals by downloading the free sample chapter today. DOWNLOAD NOW In last week’s tutorial, we tried out tcpdump and wireshark, two of the...

Persistent Memory Usage in Linux

In most cases, when a machine crashes or fails, we lose whatever we had loaded into memory, which for some applications can result in...

Engineer Finds Passion and Community With Kids On Computers

If you love technology, you can find a space for yourself and connect with others around mutual interests, according to Avni Khatri, president of...

How to install Arch Linux on VirtualBox

Arch Linux is a Linux-based operating system that is designed for i689 and 86-64 computers. Its unique package manager is responsible for providing updates...

How China Mobile Is Using Linux and Open Source

China Mobile is one of the biggest telecom companies in the world, with more than 800 million users in China -- all of whom...

5 Videos to Get You Pumped to Speak at MesosCon 2017

Last year, experts from Uber, Twitter, PayPal, and Hubspot, and many other companies shared how they use Apache Mesos at MesosCon events in North...

Distributed Logging for Containers

The era of microservices calls for a new approach to logging with built-in infrastructure for both aggregation and storage. Multiple applications running in isolated...

Evolution of Business Logic from Monoliths through Microservices, to Functions

The whole point of running application software is to deliver business value of some sort. That business value is delivered by creating business logic...

Linux Security Fundamentals Part 5: Introduction to tcpdump and wireshark

Start exploring Linux Security Fundamentals by downloading the free sample chapter today. DOWNLOAD NOW In this exercise, we learn about two of the most useful tools for...