The Ansible In Depth white paper outlines Ansible’s use cases in four categories: Configuration management Application deployment Orchestration: for coordinating a multi-machine process such as…
There are too many metrics that describes some aspects about memory in Linux. Further to an old article on this site, where several concepts were…
This article explains how two most common authentication mechanisms (NTLM and Kerberos) work. Both authentication protocols are based on symmetric key cryptography. The protocols themselves…
Introduction Authentication is used in many protocols (such as LDAP binding) and it usually involves sending password. Given the nature of authentication protocol, its traffic…
Excerpts from Cassandra The Definitive Guide Gossip and Failure Detection Cassandra uses a gossip protocol that allows each node to keep track of state information…