uncleflo

profile picture

Some cool dude. Higher order of decision making. Absolute.

Registered since September 28th, 2017

Has a total of 4246 bookmarks.

Showing top Tags within 39 bookmarks

howto   information   development   guide   reference   administration   design   website   software   solution   service   product   online   business   uk   tool   company   linux   code   server   system   application   web   list   video   marine   create   data   experience   description   tutorial   explanation   technology   build   blog   article   learn   world   project   boat   download   windows   security   lookup   free   performance   javascript   technical   control   network   beautiful   support   london   tools   course   file   research   purchase   library   programming   image   youtube   example   php   construction   html   opensource   quality   install   community   profile   computer   feature   power   browser   music   platform   mobile   work   user   process   manage   database   share   hardware   professional   buy   industry   internet   dance   advice   installation   developer   3d   camera   search   access   customer   travel   material   test   standard   money   documentation   review   css   engineering   engine   develop   webdesign   device   photography   digital   api   speed   source   management   program   phone   discussion   question   event   client   story   simple   water   marketing   yacht   app   content   setup   package   fast   idea   interface   account   communication   cheap   script   compare   study   market   live   easy   google   resource   operation   startup   monitor   training  


Tag selected: infrastructure.

Clear all

Showing 39 results.

Looking up infrastructure tag. Showing 39 results. Clear

Asante Design – Asante Design

http://uhpcamerica.com/

Saved by uncleflo on September 6th, 2022.

One of the finest examples of Ultra High Performance Concrete, “Roman Cement”, the Pantheon Building in Rome, built in 27 B.C., has been in continuous use for over 2,000 years. As the world leaders in the production of the highest quality Ultra High Performance Concrete, Asante has assembled under one roof, a world class consortium of Professions and Professionals, with the proven ability, excellence and expertise, with virtually unlimited capabilities, to provide global leadership in the Architectural Building and Construction Industry.

fireproof endure ultra creep corrosion cement cracking ceramic inferior mold concrete spray resistant mortar infrastructure creativity company profile design howto create


Becoming a Systems Architect: From Degree Types to Career Paths to $100K Salaries

https://www.noodle.com/articles/becoming-a-systems-architect-degree-types-career-paths-salary

Saved by uncleflo on January 16th, 2022.

Jobs for systems architects can be found in just about every city in the US, and systems architects are paid well for what they do. If you're technologically minded and looking for a career with lots of opportunities, this one may be a great fit. If your tech dream career involves lots of job openings, opportunities to be creative, and above-average pay, think about becoming a systems architect. Every company that uses computers needs one because it's the systems architect's job to oversee the design, configuration, maintenance, and optimization of the tech infrastructure. As a systems architect, you will work with software, hardware, servers, internet and intranet connections, and web portals, along with teams of engineers and other architects. You might also be responsible for overseeing network security. In short, you will survey an organization's computing needs and budget, and then figure out how to create an IT infrastructure that has the required resources and offers the desired user experience. When you become a systems architect, you can work in industries as diverse as telecommunications, healthcare, defense, retail, and banking. A quick look at Glassdoor typically yields openings for systems architects at companies like CVS, IBM, Apple, Amazon, and Bank of America, paying anywhere from $60,000 to more than $150,000 per year. Landing one of those jobs is a matter not only of getting the right education but also the proper certifications and experience.

architect degree type career salary path article description opportunity job computer business system architect pay infrastructure responsibility typical company diversity opening certification education howto analyst description


Snyk | Developer security | Develop fast. Stay secure.

https://snyk.io/

Saved by uncleflo on May 11th, 2021.

Developer-first Cloud Native Application Security. Loved by both developers and security teams: Find vulnerabilities while you code, with IDE and SCM integrations. Fix quickly and early, with automated remediation and actionable insight. Prevent introducing new vulnerabilities into your code base through new dependencies and code changes. Monitor with reporting and alerts providing visibility of application security posture across development teams. Manage with security and license policies and contextual prioritization defined and customized across the organization

actionable vulnerability fix insecure scanner container securely pricing alerts disclose documentation cloud visibility dependency developer automatically govern compliance coding security secure database license application code proprietary platform learn insight automate privacy infrastructure manage enhance kit howto love webdevelopment online internet


Properly Installing Python — The Hitchhiker's Guide to Python

https://docs.python-guide.org/starting/installation/

Saved by uncleflo on January 20th, 2021.

These guides go over the proper installation of Python for development purposes, as well as setuptools, pip and virtualenv. This opinionated guide exists to provide both novice and expert Python developers a best practice handbook to the installation, configuration, and usage of Python on a daily basis. There’s a good chance that you already have Python on your operating system. If so, you do not need to install or configure anything else to use Python. Having said that, I would strongly recommend that you install the tools and libraries described in the guides below before you start building Python applications for real-world use. In particular, you should always install Setuptools, Pip, and Virtualenv — they make it much easier for you to use other third-party Python libraries.

python opinionated install novice recommend installation easier configuration guide expert excellent usage tools consider infrastructure operating basis practice start setup management howto


Self-build home: project plan - Designing Buildings Wiki

https://www.designingbuildings.co.uk/wiki/Self-build_home:_project_plan

Saved by uncleflo on December 18th, 2019.

This is a free-to-use, open-access plan for the organisation, design and construction of self-build homes. If you have ideas for things to add to the plan, you can either edit the plan and add them yourself, or submit a comment and we will add them for you. There are a number of delivery routes for self-build homes: It may not be clear which route should be followed until initial assessments have been carried out, a plot located and a brief prepared. See: Develop a delivery strategy for more information. It is also possible to work with other organisations such as social landlords, developers, or community groups to develop a self-build home, however, these projects are likely to follow a plan imposed by the lead organisation and so they are not covered here, although many of the project stages will be similar. Working with a developer is sometimes called ‘custom build’ rather than ‘self build’.

competence prepare yourself outline build documentation detailed stages design custom developer homes infrastructure strategy step plan manual develop discussion description howto home house property construction project management access delivery organise


ITIL - Wikipedia

https://en.wikipedia.org/wiki/ITIL

Saved by uncleflo on December 17th, 2019.

ITIL, formerly[1] an acronym for Information Technology Infrastructure Library, is a set of detailed practices for IT service management (ITSM) that focuses on aligning IT services with the needs of business. ITIL describes processes, procedures, tasks, and checklists which are not organization-specific nor technology-specific, but can be applied by an organization toward strategy, delivering value, and maintaining a minimum level of competency. It allows the organization to establish a baseline from which it can plan, implement, and measure. It is used to demonstrate compliance and to measure improvement. There is no formal independent third party compliance assessment available for ITIL compliance in an organization. Certification in ITIL is only available to individuals. Since 2013, ITIL has been owned by AXELOS, a joint venture between Capita and the UK Cabinet Office.[2] AXELOS licenses organizations to use the ITIL intellectual property, accredits licensed examination institutes, and manages updates to the framework. Organizations that wish to implement ITIL internally do not require this license.

certification process framework compliant monitor infrastructure configuration improvement guidance it digital service busines procedure technology checklist strategy establish measure demonstrate compliance intellectual license organization good practice


How do I allow MySQL connections through SELinux? - Server Fault

https://serverfault.com/questions/240015/how-do-i-allow-mysql-connections-through-selinux

Saved by uncleflo on July 11th, 2019.

I'd like to for once leave SELinux running on a server for the alleged increased security. I usually disable SELinux to get anything to work. How do I tell SELinux to allow MySQL connections? The most I've found in the documentation is this line from mysql.com: If you are running under Linux and Security-Enhanced Linux (SELinux) is enabled, make sure you have disabled SELinux protection for the mysqld process.

fedora permission firewall subscribe overflow answer solution question connection database access administration documentation apache server selinux linux howto infrastructure mysql mariadb


AWS RDS Aurora | CLUSTER DEMO | Cross Region Replica, Types of Endpoints, HA & Fully Managed - YouTube

https://www.youtube.com/watch?v=fpkQ0zefud8

Saved by uncleflo on May 27th, 2019.

Let's learn Amazon Aurora Database from scratch. What are new features of Aurora over RDS? How to achieve HA with Aurora Cluster? What are different types of Endpoints with Aurora? Aurora compatibility with MySQL & PostgreSQL. Reader, Writer & Custom Endpoints in Aurora Cluster.

database check understand achieve architect administrator practical exercise amazon watch cluster learn db howto solution problem advanced administration infrastructure system replication available


Support Technology and Programs for AWS | AWS Support

https://aws.amazon.com/premiumsupport/

Saved by uncleflo on May 24th, 2019.

At AWS, Support goes beyond break-fix and issue resolution. AWS Support provides a mix of tools and technology, people, and programs designed to proactively help you optimize performance, lower costs, and innovate faster. We save time for your team by helping you to move faster in the cloud and focus on your core business. AWS Support brings Amazon’s tradition of customer-obsession to the B2B technology world. We focus on helping you achieve the outcomes you need to make your business successful.

innovate cloud escalation dashboard orchestration amazon agile fix utilization guidance answer delight efficient automation infrastructure help stack architecture avoid configuration customer resolution documentation support employer design demand business solution assist create solve problem administration


Careers | The British Army

https://www.army.mod.uk/careers/

Saved by uncleflo on January 3rd, 2019.

A sense of belonging may sound like a small thing. Yet it fuels you as much as food and water because it doesn't just feed your body, it feeds your mind and soul. The stronger the sense of belonging - the stronger you become. Sure, you could look for belonging in a football team or club, but the sense of belonging you'll find in the Army - well, that's the next level. When you've trained together side by side, learnt things no classroom can teach you and fought with each other, for each other - that creates a bond like no other. A bond that lasts a lifetime.

recruits recruitment platoon stronger battlefield humanitarian classroom soldier employee sense commanding teach lifetime disaster reserve adventure overseas apply learn infrastructure infantry army career team coach defence land uk gb britain life


Constant Contact makes powerful email marketing easy

https://www.constantcontact.com/uk/home-page

Saved by uncleflo on October 23rd, 2018.

Connecting with customers starts with the industry’s best email editor. Create and share professional-looking emails in minutes. Choose a mobile-optimized email template; Customize with your logo, images, and colors; Add action blocks to drive engagement; Drag and drop with ease; Tailor your message and send to your contacts

connect email industry editor professional emil optimize template engage message marketing constant contact digital howto powerful market business infrastructure integrate


Hping

http://www.hping.org/

Saved by uncleflo on October 23rd, 2018.

hping is a command-line oriented TCP/IP packet assembler/analyzer. The interface is inspired to the ping(8) unix command, but hping isn't only able to send ICMP echo requests. It supports TCP, UDP, ICMP and RAW-IP protocols, has a traceroute mode, the ability to send files between a covered channel, and many other features. While hping was mainly used as a security tool in the past, it can be used in many ways by people that don't care about security to test networks and hosts.

ping commandline tcp ip packet command protocol traceroute channel feature security tool test network host analyse administration infrastructure server computer unix


Data Warehousing Summary Tables

https://mariadb.com/kb/en/library/data-warehousing-summary-tables/

Saved by uncleflo on June 27th, 2018.

This document discusses the creation and maintenance of "Summary Tables". It is a companion to the document on Data Warehousing Techniques. The basic terminology ("Fact Table", "Normalization", etc) is covered in that document. Summary tables are a performance necessity for large tables. MariaDB and MySQL do not provide any automated way to create such, so I am providing techniques here. (Other vendors provide something similar with "materialized views".) When you have millions or billions of rows, it takes a long time to summarize the data to present counts, totals, averages, etc, in a size that is readily digestible by humans. By computing and saving subtotals as the data comes in, one can make "reports" run much faster. (I have seen 10x to 1000x speedups.) The subtotals go into a "summary table". This document guides you on efficiency in both creating and using such tables.

mysql mariadb warehouse warehousing summary table technique terminology normalization performance large material view total guide efficiency improve development developer create database average administration administrator infrastructure howto blog article description solution


Amazon - High Performance MySQL: Optimization, Backups, and Replication - Third Edition

https://www.amazon.com/_/dp/1449314287?tag=oreilly20-20

Saved by uncleflo on June 27th, 2018.

How can you bring out MySQL’s full power? With High Performance MySQL, you’ll learn advanced techniques for everything from designing schemas, indexes, and queries to tuning your MySQL server, operating system, and hardware to their fullest potential. This guide also teaches you safe and practical ways to scale applications through replication, load balancing, high availability, and failover.

amazon mysql power performance technique design index query tune server system hardware potential practical scale application replication balance availability failover infrastructure advanced optimization backup high performance buy product book information developer administration


FIN - Our core service for exchanging MT format financial messages

https://www.swift.com/our-solutions/global-financial-messaging/fin

Saved by uncleflo on March 27th, 2018.

FIN connects you to financial institutions, corporates and market infrastructures. FIN enables financial institutions to exchange individual structured (MT and ISO 15022 message formats) financial messages securely and reliably. FIN is used by over 10,800 financial institutions and their corporate customers worldwide to exchange over 22.3+ million messages per day across a wide range of business areas within the banking and securities industries. FIN value-added processing includes: Message validation to ensure messages are formatted according to SWIFT message standards. Delivery monitoring and prioritisation. Message storage and retrieval. It is based on a distributed processing architecture with full, built-in redundancy to ensure maximum availability.

financial infrastructure infra development administration institution exchange individual message security secure business industry validation standard monitor priority distributed database money fin iso corporation process availability


Fallacies of distributed computing

https://en.wikipedia.org/wiki/Fallacies_of_distributed_computing

Saved by uncleflo on December 28th, 2017.

The fallacies of distributed computing are a set of assertions made by L Peter Deutsch and others at Sun Microsystems describing false assumptions that programmers new to distributed applications invariably make.

fallacies stupid quote silly distributed database computer cluster infrastructure application assumption assume description knowledge assertion


Crypterium ICO

https://crypterium.io/

Saved by uncleflo on December 28th, 2017.

Leading Cryptobank for the Cryptoeconomy. Crypterium's goal is to provide a complete vertically integrated service that encompasses the best ideas from the entire community of the world's best blockchain enthusiasts. A cryptobank for everyone. In 8 years’ time, the crypto-economy will exceed 10 trillion dollars. Cryptobanks will become a cornerstone in the relations between decentralized economy and future daily life by expanding payment infrastructure and possibilities, creating new cryptocurrency payments scenarios and lowering interest rates. Crypterium is a cryptobank creating the future, today. Crypterium is a contactless cryptobank for everyone. Everything you need in your smartphone: payments, transfers, currency exchange, instant loans. Our goal - replace your bank.

ico cryptocurrency integration service idea community blockchain enthusiasm economy payment possibilities scenario contactless back transfer exchange loan banking expand card virtual card principle infrastructure security loyalty credit technology system opportunity interaction app online


Varonis - Protect your data from insider threats and cyberattacks

https://www.varonis.com/

Saved by uncleflo on June 30th, 2017.

Put Least Privilege on Autopilot The Varonis Automation Engine automatically repairs and maintains file systems so that you’re less vulnerable to attacks, more compliant, and consistently meeting a least privilege model. Discover undetected security gaps and automatically repair them: fix hidden security vulnerabilities like inconsistent ACLs and global access to sensitive data.

security files vulnerability automatic system infrastructure acl autopilot fix cyberattack protect data discover howto business service company profile repair gap compliant


IT and Business training courses by Global Knowledge

https://www.globalknowledge.be/

Saved by uncleflo on June 30th, 2017.

Global Knowledge is the worldwide leader in IT and business training. We deliver via training centers, private facilities, and the Internet, enabling our customers to choose when, where, and how they want to receive training programs and learning services. IT & Business Training. Our core training is focused on Avaya, Cisco, Citrix, Microsoft, VMware, Project Management and ITIL ®. Our IT courses include data centres, networking, operating systems, security, unified communications, virtualization and wireless. Our business courses feature project management, professional skills, and business process curriculum, including ITIL. Our more than 700 courses span foundational and specialized training and certifications. Worldwide Training. In 2006, we acquired FlexCom/Azlan Training, which established us as Europe’s largest IT training provider. In 2007, we expanded our global footprint to include IT training, consulting, and services in the Middle East and Africa through the acquisition of Synergy Professional Services.

knowledge training course reference security online infrastructure network service business europe eu professional quality foundation center experience establish


Qualys SSL Labs

https://www.ssllabs.com/index.html

Saved by uncleflo on June 30th, 2017.

Qualys is the leading provider of integrated asset discovery, network security, threat protection, compliance monitoring and web application security solutions. SSL Labs is a collection of documents, tools and thoughts related to SSL. It's an attempt to better understand how SSL is deployed, and an attempt to make it better. I hope that, in time, SSL Labs will grow into a forum where SSL will be discussed and improved. SSL Labs is a non-commercial research effort, and we welcome participation from any individual and organization interested in SSL.

security network protection monitor application solution compliance document research effort ssl assess tool infrastructure administration company profile


HTTP Server Header

https://www.iplocation.net/http-server-header

Saved by uncleflo on June 30th, 2017.

Welcome to IP Location, the home of IP Geolocation and IP Resources. This website was built to offer tips, tutorials and articles on IPv4 and IPv6 addresses, and how it relates to TCP/IP and Internet. HTTP is the protocol used to transfer data between the web server and browsers. When a browser requests a HTML document from a web server, the browser send an URL (web address) with a request header. The server respond to a browser by providing a HTTP response header and the requested document (if exists). This tool extracts the HTTP server response headers, and displays them to you.

ip network location server header administration computer infrastructure security check apache iis webserver certificate url domain address checker validator


How To Use Netcat to Establish and Test TCP and UDP Connections on a VPS

https://www.digitalocean.com/community/tutorials/how-to-use-netcat-to-establish-and-test-tcp-and-udp-connections-on-a-vps

Saved by uncleflo on June 27th, 2017.

Linux is known for having a great number of mature, useful command line utilities available out of the box in most distributions. Skilled system administrators can do much of their work using the built-in tools without having to install additional software. In this guide, we will discuss how to use the netcat utility. Often referred to as a Swiss army knife of networking tools, this versatile command can assist you in monitoring, testing, and sending data across network connections. We will be exploring this on an Ubuntu 12.04 VPS, but netcat should be available on almost any modern Linux distribution. Ubuntu ships with the BSD variant of netcat, and this is what we will be using in this guide. Other versions may operate differently or provide other options.

netcat establish test tcp udp connection vps article blog write describe description linux serve html apache simple server http monitor network infrastructure technical development tool administration reference lookup command list


Netcat – a couple of useful examples

https://www.g-loaded.eu/2006/11/06/netcat-a-couple-of-useful-examples/

Saved by uncleflo on June 27th, 2017.

One of the Linux command line tools I had initially under-estimated is netcat or just nc. By default, netcat creates a TCP socket either in listening mode (server socket) or a socket that is used in order to connect to a server (client mode). Actually, netcat does not care whether the socket is meant to be a server or a client. All it does is to take the data from stdin and transfer it to the other end across the network. The simplest example of its usage is to create a server-client chat system. Although this is a very primitive way to chat, it shows how netcat works. In the following examples it is assumed that the machine that creates the listening socket (server) has the 192.168.0.1 IP address. So, create the chat server on this machine and set it to listen to 3333 TCP port

netcat tool dos telnet communication howto technical client server infrastructure socket share data transfer tcp linux windows line administration lookup reference blog description explanation explain examples


Realtime Visibility into Global Cyber Attacks

http://www.norse-corp.com/

Saved by uncleflo on June 27th, 2017.

WE’RE AGGRESSIVE: We believe you have to be at least as aggressive and entrepreneurial as your digital adversaries in order to defeat them. Chasing the known threats is easy. It’s the unknown that’s hard. That means we can’t just react — we have to pre-empt. We have to smash the attack chain before it gets built. WE’RE LOOKING FOR TROUBLE: We believe in taking the hits so our customers don’t have to. That’s why we wander the worst neighborhoods of the Internet, looking for trouble, just asking to be attacked. That’s why we’ve built the biggest dedicated threat detection network in the world, and populated it with millions of honeypots, agents, sensors and crawlers. WE’RE NORSE: Norse is dedicated to delivering live, accurate and unique attack intelligence that helps our customers block attacks, uncover hidden breaches and track threats emerging around the globe. Norse offerings leverage a continuously updated torrent of telemetry from the world’s largest network of dedicated threat intelligence sensors. Norse is focused on dramatically improving the performance, catch-rate and return-on-investment for enterprise security infrastructures.

security vulnerability problem infrastructure solution threat aggressive digital adversary pre-emptive intelligence realtime cyber cyberattack corporation agent crawler


Assigned Internet Protocol Numbers

http://www.iana.org/assignments/protocol-numbers/protocol-numbers.xml

Saved by uncleflo on February 8th, 2017.

In the Internet Protocol version 4 (IPv4) [RFC791] there is a field called "Protocol" to identify the next level protocol. This is an 8 bit field. In Internet Protocol version 6 (IPv6) [RFC2460], this field is called the "Next Header" field.

administration server network infrastructure data protocol number assignment iana assign field value reference list lookup standard world internet