In a previous blog post by one of my colleagues, we shared how we developed a powerful semantic search engine for our NetEye User Guide. This solution uses Elasticsearch in combination with machine ...
During engagements, it may happen that a Linux machine is compromised with only a brief and limited window of access. In such ...
In today’s fast-paced digital world, CI/CD (Continuous Integration and Continuous Deployment/Delivery) has become a cornerstone of modern software development, streamlining and automating the process ...
On the 36th Chaos Communication Congresses back before Covid forced a three year break, I attended a talk from the German tech-blogger Fefe. There he talked about the “nützlich-unbedenklich Spektrum” ...
The Microsoft Remote Desktop Services (RDS) architecture is widely used to publish centralized Desktop and Windows Applications to users from remote sites. With RDS, only the software user interfaces ...
It seems we can’t find what you’re looking for. Perhaps searching can help.
Note: $SERVICE serves as a placeholder for any Cluster Service running in NetEye 4. At least ten constraints were necessary to model the required relations (on ...
On the 36th Chaos Communication Congresses back before Covid forced a three year break, I attended a talk from the German tech-blogger Fefe. There he talked about the “nützlich-unbedenklich Spektrum” ...
The famous company Gravy Analytics seems to have suffered an attack. In fact, inside the XSS forum, a post was published, on Sunday night by the user nightly, reporting some evidence of what appears ...
We fixed a bug in the Elasticsearch action of Tornado UI that prevented the rule to be saved when either data or auth fields were edited.
During the Service Strategy in ITIL, before starting with the redaction of a Service Portfolio it is important to obtain a wider overview of the Company Services that are recognized by the Business ...