Linux Best Practices

Alibabacloud.com offers a wide variety of articles about linux best practices, easily find your linux best practices information here online.

Hadoop MapReduce Development Best Practices

This is the second of the Hadoop Best Practice series, and the last one is "10 best practices for Hadoop administrators." Mapruduce development is slightly more complicated for most programmers, and running a wordcount (the Hello Word program in Hadoop) is not only familiar with the Mapruduce model, but also the Linux commands (though there are Cygwin, But it's still a hassle to run mapruduce under windows ...

Cloud and data security practices at ISC 2014 (free admission)

Oscar-winning actress photos of bulk leakage, UPS user information stolen, mobile devices have security vulnerabilities, many security risks caused people's concern. The development of the Internet, Google Glasses, smart watches, such as wearable equipment has been the advent of the industry's hot debate, they bring convenience at the same time also violate the user's privacy. By the National Computer Network emergency Treatment Coordination Center, China Information Security Evaluation Center, National Computer virus Emergency treatment center and China Internet Association guidance, 360 Internet Security Center and China Internet Association Network and Information Security Work Committee sponsored by China Internet Security ...

Pre-build Linux images deploy a multi-node hadoop cluster in Windows Azure

This article is written by http://www.aliyun.com/zixun/aggregation/13357.html ">azure CAT team Piyush Ranjan (MSFT). As infrastructure services (virtual machines and virtual networks) are recently officially released on Windows Azure, more and more enterprise workloads are migrating to the public cloud to take advantage of cloud profitability, scale, and speed. I recently participated in one of the enterprise work negative ...

Three key best practices in cloud application security protection

Cloud based applications are now widely used and are growing at an alarming rate. Because cloud-based applications can be accessed over the Internet and accessible to anyone anywhere, the security of the application becomes particularly important.   This is why businesses that create and manage cloud-based applications must ensure that every layer of the application infrastructure that customers trust is secure. Imagine if Google's Gmail was hacked, hackers can read the content of the user's mail, what will be the consequences? Not only Google's voice ...

Docker Best Practices! 2014 Container Technical Conference

2014 Container Technical Conference (Container conference 2014) will be held in Beijing Zhongguancun Software Park on October 18, 2014. As the hottest container technology at the moment, Docker will be one of the most distinctive themes of the conference. CSDN Cloud Computing channel has invited Docker official and Google Kubernetes core developers, they will come to China, and domestic users to share Docker technical details, discuss Docker future ...

The rise of micro-service architecture

"Editor's note" Docker has changed many things in the field of application development and has become one of the most popular open source projects, and fundamentally changed the way people build applications. Docker is changing cloud development practices, allowing anyone to leverage the best practices of the packaged community in the form of other containers, like the Lego toys of cloud components. Docker is like a forest fire, and the new Linux container technology has ignited everything around it in its own way, and many of us are struggling to keep up with the speed at which it spreads. Docke ...

The security of container vs virtualization

Editor's note: When it comes to the safety of containers, most people say it's not safe enough to give up the high performance and convenience it brings. The author of this article thinks that Docker has already provided a safe mode, and can be used with all Linux security schemes such as SELinux, as, but many people do not use it well. By comparing bare-metal, VMS and container to buildings, apartments and private rooms, the authors illustrate the problem. Of course, from another perspective, the author only considers the problem of single tenant, the situation of the multi-tenant, C ...

Cloud storage standards who will follow the CDMI specification

The cloud storage Standard--CDMI specification, published by SNIa in April 2010, may have been a thrill for cloud-storage-related vendors, but how much does it do for the security and stability of cloud storage and the scalability of the current user's suspicions?     We don't know. Cloud storage was originally a concept that came out after cloud computing, but it didn't come up with a standard before cloud computing. This also fulfilled the phrase Bill Gates once said: "Cloud storage will be faster than cloud computing." Cloud ...

Fast, low-cost completion of the development of innovative companies how to do

As a software engineer, the past few years have been dedicated to web development. In innovative companies, speed saves time, money, and money to ask more engineers to make the whole development faster. The school does not teach many "software engineering" methods, or how to be a good programmer. These things do not exist in the Taiwan industry, we are doing side touch, learn from experience. I've learned a lot from books and the internet about ways to make the team more productive, because I believe that I have to do this in the new team, with the industry's recognition that it's fast ...

Ctrip practice case sharing: using HTML5 to monitor site performance

The intermediary transaction SEO diagnoses Taobao guest Cloud host technology Hall text/Shingdong, Liu, Xie School HTML5 Technology brings many new elements to the web, not only makes the website become more and more beautiful, the interactive experience is getting closer to perfect, even more makes many once impossible function can realize.   This article aims at the new characteristic which the HTML5 brings in the website performance monitoring, shares with everybody Ctrip traveling network in this direction the practical experience. Site performance monitoring of the status of the Web site performance is increasingly popular concern, because it directly ...

Total Pages: 3 1 2 3 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.