Information Technology Broadcasting - اطلاع‌رسانی فناوری اطلاعات
410 subscribers
13.9K photos
41 videos
505 files
489 links
Information Technology, Cloud computing, Digital transformation, IoT, Edge computing, IT governance, Fog computing, IT security, IT regulation, IT trends, Programming، Big data, Monitoring, Databases, Api, Service
Download Telegram
Word of the day...
👇👇👇
Container-as-a-Service 

CaaS (or Container-as-a-Service) is a service provided by the cloud providers who render container orchestration and computing resources. The framework can be utilized by IT industry developers through web interface or API for easy container management. This new generation of cloud computing technology can be considered as a new layer in cloud platform to deploy application. It indicates towards the software that is purposed to give relief from the stress between operational and developmental team in a business. CaaS is useful at the time of pushing application data and monitoring program.
The tools under Container-as-a-Service category simplifies management and renders a framework not only to define the initial deployment level of the container but, also to manage several containers as a single thing. The whole and sole aim of these tools are to deal with scaling, networking, and availability. Azure Container Service, Google Container Engine, Cloud Foundry’s Diego, etc., are the live example of this next-gen cloud computing technology.
Zabbix_Cookbook_Over_70_Hands_On.pdf
3.3 MB
Emailing Zabbix Cookbook - Over 70 Hands On Recipes To Get Your Infrastructure Up And Running With Zabbix.pdf
#zabbix #monitoring cookbook👆👆👆
آشنایی با اصول و مفاهیم مانیتورینگ زبیکس
تغییر سیاست های کاخ سفید در حوزه رایانش ابری از استراتژی Cloud First به Cloud Smart

> https://cloud.cio.gov/strategy/

> پیش از این در سال 2011، استراتژی دولت فدرال در حوزه رایانش ابری با سیاست Cloud First مطرح شده بود.

#CloudFirst #CloudSmart
@msjavan_ir
To be Cloud Smart, agencies must consider how to use their current resources to maximize value: reskilling and retraining staff, enhancing security postures, and using best practices and shared knowledge in acquisitions. Cloud Smart is about equipping agencies with the tools and knowledge they need to make these decisions for themselves, rather than a one-size-fits-all approach.
Words of the day...
👇👇👇
IDS & SIEM

An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations. Any malicious activity or violation is typically reported either to an administrator or collected centrally using a security information and event management (SIEM) system. A SIEM system combines outputs from multiple sources and uses alarm filtering techniques to distinguish malicious activity from false alarms
Words of the day...
👇👇👇

HoneyPot & HoneyNet

A honeynet is a network set up with intentional vulnerabilities; its purpose is to invite attack, so that an attacker's activities and methods can be studied and that information used to increase network security. A honeynet contains one or more honey pots, which are computer systems on the Internet expressly set up to attract and "trap" people who attempt to penetrate other people's computer systems. Although the primary purpose of a honeynet is to gather information about attackers' methods and motives, the decoy network can benefit its operator in other ways, for example by diverting attackers from a real network and its resources.