
Registered since September 28th, 2017
Has a total of 4246 bookmarks.
Showing top Tags within 39 bookmarks
howto information development guide reference administration design website software solution service product online business uk tool company linux code server system application web list video marine create data experience description tutorial explanation technology build blog article learn world project boat download windows security lookup free performance javascript technical control network beautiful support london tools course file research purchase library programming image youtube example php construction html opensource quality install community profile computer feature power browser music platform mobile work user process manage database share hardware professional buy industry internet dance advice installation developer 3d camera search access customer travel material test standard money documentation review css engineering engine develop webdesign device photography digital api speed source management program phone discussion question event client story simple water marketing yacht app content setup package fast idea interface account communication cheap script compare study market live easy google resource operation startup monitor training
Tag selected: infrastructure.
Looking up infrastructure tag. Showing 39 results. Clear
Saved by uncleflo on September 6th, 2022.
One of the finest examples of Ultra High Performance Concrete, “Roman Cement”, the Pantheon Building in Rome, built in 27 B.C., has been in continuous use for over 2,000 years. As the world leaders in the production of the highest quality Ultra High Performance Concrete, Asante has assembled under one roof, a world class consortium of Professions and Professionals, with the proven ability, excellence and expertise, with virtually unlimited capabilities, to provide global leadership in the Architectural Building and Construction Industry.
fireproof endure ultra creep corrosion cement cracking ceramic inferior mold concrete spray resistant mortar infrastructure creativity company profile design howto create
Saved by uncleflo on January 16th, 2022.
Jobs for systems architects can be found in just about every city in the US, and systems architects are paid well for what they do. If you're technologically minded and looking for a career with lots of opportunities, this one may be a great fit. If your tech dream career involves lots of job openings, opportunities to be creative, and above-average pay, think about becoming a systems architect. Every company that uses computers needs one because it's the systems architect's job to oversee the design, configuration, maintenance, and optimization of the tech infrastructure. As a systems architect, you will work with software, hardware, servers, internet and intranet connections, and web portals, along with teams of engineers and other architects. You might also be responsible for overseeing network security. In short, you will survey an organization's computing needs and budget, and then figure out how to create an IT infrastructure that has the required resources and offers the desired user experience. When you become a systems architect, you can work in industries as diverse as telecommunications, healthcare, defense, retail, and banking. A quick look at Glassdoor typically yields openings for systems architects at companies like CVS, IBM, Apple, Amazon, and Bank of America, paying anywhere from $60,000 to more than $150,000 per year. Landing one of those jobs is a matter not only of getting the right education but also the proper certifications and experience.
architect degree type career salary path article description opportunity job computer business system architect pay infrastructure responsibility typical company diversity opening certification education howto analyst description
Saved by uncleflo on May 11th, 2021.
Developer-first Cloud Native Application Security. Loved by both developers and security teams: Find vulnerabilities while you code, with IDE and SCM integrations. Fix quickly and early, with automated remediation and actionable insight. Prevent introducing new vulnerabilities into your code base through new dependencies and code changes. Monitor with reporting and alerts providing visibility of application security posture across development teams. Manage with security and license policies and contextual prioritization defined and customized across the organization
actionable vulnerability fix insecure scanner container securely pricing alerts disclose documentation cloud visibility dependency developer automatically govern compliance coding security secure database license application code proprietary platform learn insight automate privacy infrastructure manage enhance kit howto love webdevelopment online internet
Saved by uncleflo on January 20th, 2021.
These guides go over the proper installation of Python for development purposes, as well as setuptools, pip and virtualenv. This opinionated guide exists to provide both novice and expert Python developers a best practice handbook to the installation, configuration, and usage of Python on a daily basis. There’s a good chance that you already have Python on your operating system. If so, you do not need to install or configure anything else to use Python. Having said that, I would strongly recommend that you install the tools and libraries described in the guides below before you start building Python applications for real-world use. In particular, you should always install Setuptools, Pip, and Virtualenv — they make it much easier for you to use other third-party Python libraries.
python opinionated install novice recommend installation easier configuration guide expert excellent usage tools consider infrastructure operating basis practice start setup management howto
Saved by uncleflo on December 18th, 2019.
This is a free-to-use, open-access plan for the organisation, design and construction of self-build homes. If you have ideas for things to add to the plan, you can either edit the plan and add them yourself, or submit a comment and we will add them for you. There are a number of delivery routes for self-build homes: It may not be clear which route should be followed until initial assessments have been carried out, a plot located and a brief prepared. See: Develop a delivery strategy for more information. It is also possible to work with other organisations such as social landlords, developers, or community groups to develop a self-build home, however, these projects are likely to follow a plan imposed by the lead organisation and so they are not covered here, although many of the project stages will be similar. Working with a developer is sometimes called ‘custom build’ rather than ‘self build’.
competence prepare yourself outline build documentation detailed stages design custom developer homes infrastructure strategy step plan manual develop discussion description howto home house property construction project management access delivery organise
Saved by uncleflo on December 17th, 2019.
ITIL, formerly[1] an acronym for Information Technology Infrastructure Library, is a set of detailed practices for IT service management (ITSM) that focuses on aligning IT services with the needs of business. ITIL describes processes, procedures, tasks, and checklists which are not organization-specific nor technology-specific, but can be applied by an organization toward strategy, delivering value, and maintaining a minimum level of competency. It allows the organization to establish a baseline from which it can plan, implement, and measure. It is used to demonstrate compliance and to measure improvement. There is no formal independent third party compliance assessment available for ITIL compliance in an organization. Certification in ITIL is only available to individuals. Since 2013, ITIL has been owned by AXELOS, a joint venture between Capita and the UK Cabinet Office.[2] AXELOS licenses organizations to use the ITIL intellectual property, accredits licensed examination institutes, and manages updates to the framework. Organizations that wish to implement ITIL internally do not require this license.
certification process framework compliant monitor infrastructure configuration improvement guidance it digital service busines procedure technology checklist strategy establish measure demonstrate compliance intellectual license organization good practice
Saved by uncleflo on July 11th, 2019.
I'd like to for once leave SELinux running on a server for the alleged increased security. I usually disable SELinux to get anything to work. How do I tell SELinux to allow MySQL connections? The most I've found in the documentation is this line from mysql.com: If you are running under Linux and Security-Enhanced Linux (SELinux) is enabled, make sure you have disabled SELinux protection for the mysqld process.
fedora permission firewall subscribe overflow answer solution question connection database access administration documentation apache server selinux linux howto infrastructure mysql mariadb
Saved by uncleflo on May 27th, 2019.
Let's learn Amazon Aurora Database from scratch. What are new features of Aurora over RDS? How to achieve HA with Aurora Cluster? What are different types of Endpoints with Aurora? Aurora compatibility with MySQL & PostgreSQL. Reader, Writer & Custom Endpoints in Aurora Cluster.
database check understand achieve architect administrator practical exercise amazon watch cluster learn db howto solution problem advanced administration infrastructure system replication available
Saved by uncleflo on May 24th, 2019.
At AWS, Support goes beyond break-fix and issue resolution. AWS Support provides a mix of tools and technology, people, and programs designed to proactively help you optimize performance, lower costs, and innovate faster. We save time for your team by helping you to move faster in the cloud and focus on your core business. AWS Support brings Amazon’s tradition of customer-obsession to the B2B technology world. We focus on helping you achieve the outcomes you need to make your business successful.
innovate cloud escalation dashboard orchestration amazon agile fix utilization guidance answer delight efficient automation infrastructure help stack architecture avoid configuration customer resolution documentation support employer design demand business solution assist create solve problem administration
Saved by uncleflo on January 3rd, 2019.
A sense of belonging may sound like a small thing. Yet it fuels you as much as food and water because it doesn't just feed your body, it feeds your mind and soul. The stronger the sense of belonging - the stronger you become. Sure, you could look for belonging in a football team or club, but the sense of belonging you'll find in the Army - well, that's the next level. When you've trained together side by side, learnt things no classroom can teach you and fought with each other, for each other - that creates a bond like no other. A bond that lasts a lifetime.
recruits recruitment platoon stronger battlefield humanitarian classroom soldier employee sense commanding teach lifetime disaster reserve adventure overseas apply learn infrastructure infantry army career team coach defence land uk gb britain life
Saved by uncleflo on October 23rd, 2018.
Connecting with customers starts with the industry’s best email editor. Create and share professional-looking emails in minutes. Choose a mobile-optimized email template; Customize with your logo, images, and colors; Add action blocks to drive engagement; Drag and drop with ease; Tailor your message and send to your contacts
connect email industry editor professional emil optimize template engage message marketing constant contact digital howto powerful market business infrastructure integrate
Saved by uncleflo on October 23rd, 2018.
hping is a command-line oriented TCP/IP packet assembler/analyzer. The interface is inspired to the ping(8) unix command, but hping isn't only able to send ICMP echo requests. It supports TCP, UDP, ICMP and RAW-IP protocols, has a traceroute mode, the ability to send files between a covered channel, and many other features. While hping was mainly used as a security tool in the past, it can be used in many ways by people that don't care about security to test networks and hosts.
ping commandline tcp ip packet command protocol traceroute channel feature security tool test network host analyse administration infrastructure server computer unix
Saved by uncleflo on June 27th, 2018.
This document discusses the creation and maintenance of "Summary Tables". It is a companion to the document on Data Warehousing Techniques. The basic terminology ("Fact Table", "Normalization", etc) is covered in that document. Summary tables are a performance necessity for large tables. MariaDB and MySQL do not provide any automated way to create such, so I am providing techniques here. (Other vendors provide something similar with "materialized views".) When you have millions or billions of rows, it takes a long time to summarize the data to present counts, totals, averages, etc, in a size that is readily digestible by humans. By computing and saving subtotals as the data comes in, one can make "reports" run much faster. (I have seen 10x to 1000x speedups.) The subtotals go into a "summary table". This document guides you on efficiency in both creating and using such tables.
mysql mariadb warehouse warehousing summary table technique terminology normalization performance large material view total guide efficiency improve development developer create database average administration administrator infrastructure howto blog article description solution
Saved by uncleflo on June 27th, 2018.
How can you bring out MySQL’s full power? With High Performance MySQL, you’ll learn advanced techniques for everything from designing schemas, indexes, and queries to tuning your MySQL server, operating system, and hardware to their fullest potential. This guide also teaches you safe and practical ways to scale applications through replication, load balancing, high availability, and failover.
amazon mysql power performance technique design index query tune server system hardware potential practical scale application replication balance availability failover infrastructure advanced optimization backup high performance buy product book information developer administration
Saved by uncleflo on March 27th, 2018.
FIN connects you to financial institutions, corporates and market infrastructures. FIN enables financial institutions to exchange individual structured (MT and ISO 15022 message formats) financial messages securely and reliably. FIN is used by over 10,800 financial institutions and their corporate customers worldwide to exchange over 22.3+ million messages per day across a wide range of business areas within the banking and securities industries. FIN value-added processing includes: Message validation to ensure messages are formatted according to SWIFT message standards. Delivery monitoring and prioritisation. Message storage and retrieval. It is based on a distributed processing architecture with full, built-in redundancy to ensure maximum availability.
financial infrastructure infra development administration institution exchange individual message security secure business industry validation standard monitor priority distributed database money fin iso corporation process availability
Saved by uncleflo on December 28th, 2017.
The fallacies of distributed computing are a set of assertions made by L Peter Deutsch and others at Sun Microsystems describing false assumptions that programmers new to distributed applications invariably make.
fallacies stupid quote silly distributed database computer cluster infrastructure application assumption assume description knowledge assertion
Saved by uncleflo on December 28th, 2017.
Leading Cryptobank for the Cryptoeconomy. Crypterium's goal is to provide a complete vertically integrated service that encompasses the best ideas from the entire community of the world's best blockchain enthusiasts. A cryptobank for everyone. In 8 years’ time, the crypto-economy will exceed 10 trillion dollars. Cryptobanks will become a cornerstone in the relations between decentralized economy and future daily life by expanding payment infrastructure and possibilities, creating new cryptocurrency payments scenarios and lowering interest rates. Crypterium is a cryptobank creating the future, today. Crypterium is a contactless cryptobank for everyone. Everything you need in your smartphone: payments, transfers, currency exchange, instant loans. Our goal - replace your bank.
ico cryptocurrency integration service idea community blockchain enthusiasm economy payment possibilities scenario contactless back transfer exchange loan banking expand card virtual card principle infrastructure security loyalty credit technology system opportunity interaction app online
Saved by uncleflo on June 30th, 2017.
Put Least Privilege on Autopilot The Varonis Automation Engine automatically repairs and maintains file systems so that you’re less vulnerable to attacks, more compliant, and consistently meeting a least privilege model. Discover undetected security gaps and automatically repair them: fix hidden security vulnerabilities like inconsistent ACLs and global access to sensitive data.
security files vulnerability automatic system infrastructure acl autopilot fix cyberattack protect data discover howto business service company profile repair gap compliant
Saved by uncleflo on June 30th, 2017.
Global Knowledge is the worldwide leader in IT and business training. We deliver via training centers, private facilities, and the Internet, enabling our customers to choose when, where, and how they want to receive training programs and learning services. IT & Business Training. Our core training is focused on Avaya, Cisco, Citrix, Microsoft, VMware, Project Management and ITIL ®. Our IT courses include data centres, networking, operating systems, security, unified communications, virtualization and wireless. Our business courses feature project management, professional skills, and business process curriculum, including ITIL. Our more than 700 courses span foundational and specialized training and certifications. Worldwide Training. In 2006, we acquired FlexCom/Azlan Training, which established us as Europe’s largest IT training provider. In 2007, we expanded our global footprint to include IT training, consulting, and services in the Middle East and Africa through the acquisition of Synergy Professional Services.
knowledge training course reference security online infrastructure network service business europe eu professional quality foundation center experience establish
Saved by uncleflo on June 30th, 2017.
Qualys is the leading provider of integrated asset discovery, network security, threat protection, compliance monitoring and web application security solutions. SSL Labs is a collection of documents, tools and thoughts related to SSL. It's an attempt to better understand how SSL is deployed, and an attempt to make it better. I hope that, in time, SSL Labs will grow into a forum where SSL will be discussed and improved. SSL Labs is a non-commercial research effort, and we welcome participation from any individual and organization interested in SSL.
security network protection monitor application solution compliance document research effort ssl assess tool infrastructure administration company profile
Saved by uncleflo on June 30th, 2017.
Welcome to IP Location, the home of IP Geolocation and IP Resources. This website was built to offer tips, tutorials and articles on IPv4 and IPv6 addresses, and how it relates to TCP/IP and Internet. HTTP is the protocol used to transfer data between the web server and browsers. When a browser requests a HTML document from a web server, the browser send an URL (web address) with a request header. The server respond to a browser by providing a HTTP response header and the requested document (if exists). This tool extracts the HTTP server response headers, and displays them to you.
ip network location server header administration computer infrastructure security check apache iis webserver certificate url domain address checker validator
Saved by uncleflo on June 27th, 2017.
Linux is known for having a great number of mature, useful command line utilities available out of the box in most distributions. Skilled system administrators can do much of their work using the built-in tools without having to install additional software. In this guide, we will discuss how to use the netcat utility. Often referred to as a Swiss army knife of networking tools, this versatile command can assist you in monitoring, testing, and sending data across network connections. We will be exploring this on an Ubuntu 12.04 VPS, but netcat should be available on almost any modern Linux distribution. Ubuntu ships with the BSD variant of netcat, and this is what we will be using in this guide. Other versions may operate differently or provide other options.
netcat establish test tcp udp connection vps article blog write describe description linux serve html apache simple server http monitor network infrastructure technical development tool administration reference lookup command list
Saved by uncleflo on June 27th, 2017.
One of the Linux command line tools I had initially under-estimated is netcat or just nc. By default, netcat creates a TCP socket either in listening mode (server socket) or a socket that is used in order to connect to a server (client mode). Actually, netcat does not care whether the socket is meant to be a server or a client. All it does is to take the data from stdin and transfer it to the other end across the network. The simplest example of its usage is to create a server-client chat system. Although this is a very primitive way to chat, it shows how netcat works. In the following examples it is assumed that the machine that creates the listening socket (server) has the 192.168.0.1 IP address. So, create the chat server on this machine and set it to listen to 3333 TCP port
netcat tool dos telnet communication howto technical client server infrastructure socket share data transfer tcp linux windows line administration lookup reference blog description explanation explain examples
Saved by uncleflo on June 27th, 2017.
WE’RE AGGRESSIVE: We believe you have to be at least as aggressive and entrepreneurial as your digital adversaries in order to defeat them. Chasing the known threats is easy. It’s the unknown that’s hard. That means we can’t just react — we have to pre-empt. We have to smash the attack chain before it gets built. WE’RE LOOKING FOR TROUBLE: We believe in taking the hits so our customers don’t have to. That’s why we wander the worst neighborhoods of the Internet, looking for trouble, just asking to be attacked. That’s why we’ve built the biggest dedicated threat detection network in the world, and populated it with millions of honeypots, agents, sensors and crawlers. WE’RE NORSE: Norse is dedicated to delivering live, accurate and unique attack intelligence that helps our customers block attacks, uncover hidden breaches and track threats emerging around the globe. Norse offerings leverage a continuously updated torrent of telemetry from the world’s largest network of dedicated threat intelligence sensors. Norse is focused on dramatically improving the performance, catch-rate and return-on-investment for enterprise security infrastructures.
security vulnerability problem infrastructure solution threat aggressive digital adversary pre-emptive intelligence realtime cyber cyberattack corporation agent crawler
Saved by uncleflo on February 8th, 2017.
In the Internet Protocol version 4 (IPv4) [RFC791] there is a field called "Protocol" to identify the next level protocol. This is an 8 bit field. In Internet Protocol version 6 (IPv6) [RFC2460], this field is called the "Next Header" field.
administration server network infrastructure data protocol number assignment iana assign field value reference list lookup standard world internet