Logging

Want to know logging? we have a huge selection of logging information on alibabacloud.com

Spark Streaming fault-tolerant improvements and 0 data loss

This article comes from a blog article from the spark streaming project leader Tathagata Das, who is now working for the Databricks company. In the past, the Amplab laboratory in UC Berkeley has been working on large data and spark streaming.   This paper mainly talks about the improvement of spark streaming fault tolerance and 0 data loss. The following is the original: the real-time streaming system must be able to work within 24/7 hours, so it needs to have from various systems ...

Oracle's high-profile Promotion of database service

Oracle claims that its new 12c database is faster and stronger than other databases, and that the new database will be able to serve multiple databases of different sizes and ranges based on the needs of specific users. Senior vice president of database server technology Andy Mendelssohn says many Oracle customers are excited about 12c for some reason. "Customers tell us that they want a database, a service, an in-house deployment service," he said. "12c was launched in June and includes a widely publicized feature ...

Windows Azure Tips, tools, and coding best practices

In the process of writing this series of articles, I have summed up a number of best practices. In this article, I've covered more things to consider when protecting your Windows Azure application. Here are some tools and coding tips and best practices: running on the operating system to get the latest security patches as much as possible to run error handling in partial trust mode how to implement a retry logical record error in Windows Azure storage access to a Blob of access rights storage connection string Guard mode ...

Why search engines never patronize my station

Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest cloud host technology Hall in fact, search spiders are very diligent, at least the sesame is so feel." But what's amazing is that the most asked questions are why the search engines don't patronize my station? Why haven't I been included in my station? This question has not been asked by hundreds of people, in fact, Sesame felt that there are a lot of comprehensive reasons, total ...

Journal of Technology and Life: Web Server security

"Silicon Valley network September 19," according to "Science and Technology and Life" magazine 2012 13th issue, in the rapid development of the internet today, http://www.aliyun.com/zixun/aggregation/17117.html "> Web servers have become an integral part of the Internet. As Web applications become more and more widespread, attackers also target the Web server, so their security is more and more important. This article is not only a simple introduction to the Web server, ...

not found

404! Not Found!

Sorry, you’ve landed on an unexplored planet!

Return Home
phone Contact Us

DevOps: Focus on application performance based on cloud computing

The application performance of the public cloud computing is unsatisfactory, which leads to the frustration of end-user use. SLAs from PAAs and IaaS providers are generally valid, but not overall response time. The DevOps team monitors the performance of cloud computing applications by using different tools. 350 IT experts from North America assessed the average loss of $985,260 trillion in revenue per year due to performance problems based on cloud computing applications, according to Compuware. European Union respondents said they would lose an average of 777,000 dollars. Apply Performance Issues ...

Big data: No, how to use it?

The satellite collects so much data, if not, what do you collect it for? If only a handful of people closed the door, what is this secrecy supposed to prevent? Large data is used to protect the environment, and researchers develop new forest mapping tools that warn the monitors when large tracts of forest are felled and destroyed. Now the domestic big data is called very loudly, but the empty talk is more. I don't like empty talk, I want to see application examples of large data. The April 16 "Technology Overview" Reminder list (IEEE Spectrum alert) publishes an article ...

Talking about how to log in to the classification directory

Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest Cloud host Technology Hall Website Login Classification directory is not as simple as submitting to an automatic search engine, The latter generally only needs to enter a URL. The steps of the login classification directory are: query various topic categories, find the most suitable for their own directory and then start submitting, fill out the details of the website, the company and contact information. In the correct directory to select login ...

Shopping planning website Slice push iphone app to track merchandise

Sina Science and technology news Beijing time, November 15 night, by Google chairman Eric Schmidt, the shopping planning website Slice today launched the first mobile application for the iphone, can automatically track the user's shopping process. Slice provides users with Yahoo Mail (yahoo Mail) and Gmail apps to plan online shopping by analyzing the user's email inbox. The function is similar to TripIt, and slice can also track the user's shopping receipts ...

Two "notice" set limited to the implementation of the two-Fu industrial investment Project

The two "notices" issued in November 2010 in Fujian Province will limit the two projects that the company has not yet implemented, and the performance of its most important subsidiaries in the next 3 years will also be affected. China-FU Industry announced today the announcement of the November 2010 Fujian Provincial Forestry Department issued the "on the moratorium on natural forest harvesting emergency notice," the same month, Fujian Provincial party committee, the provincial government issued the "on speeding up afforestation and afforestation to promote forest Fujian construction notice." According to the spirit of these two "notices", Fujian Province will strictly control the production of low yielding forests from 2011 onwards for three consecutive years, suspending the natural ...

MapReduce: Simple data processing on Super large cluster

MapReduce: Simple data processing on large cluster

FortiOS 6.0 VPN: Fortinet Security Fabric over IPsec VPN

In this recipe, you add FortiTelemetry traffic to an existing IPsec VPN site-to-site tunnel between two FortiGate devices, in order to add a remote FortiGate to the Security Fabric. You also allow the remote FortiGate to access the FortiAnalyzer for logging.

FortiOS 6.0 Expert Recipe: SD-WAN with FGCP HA

This recipe provides an example of how to set up a FortiGate for redundant Internet connectivity using SD-WAN and then convert this single FortiGate into an FGCP HA cluster of two FortiGates.

FortiOS 5.2 Getting Started: Packet capture

In this example, you will set up and run some basic packet capture filters on your FortiGate and download and view the resulting .pcap file.

FortiOS 5.2 Getting Started: Installing a FortiGate in NAT/Route mode

In this example, you will learn how to connect and configure a new FortiGate unit in NAT/Route mode to securely connect a private network to the Internet.

FortiOS 5.2 VPN: Multi-realm SSL VPN tunnel

In this recipe you will learn how to create a simple multi-realm SSL VPN tunnel that provides different portals for different user groups.

Inventory: The top ten cloud computing services interruption accident

To help businesses avoid failures in cloud services, the United States "Networkworld" specifically lists the 10 most severe cloud service outages that have been experienced by many of the world's web sites and the lessons we can learn from them. Serious cloud Interruption 1: Amazon Web service interruption exemption from tedious network maintenance is the main selling point of doing business in the cloud. But the disadvantage of this service is that users will be helpless when cloud vendors routinely change their configuration to disrupt your business. This is what many Amazon Web service users experienced in April this year. At that time, the Amazon North ...

Analysis of security strategy for information security cloud computing from icloud

Apple's icloud service has made users excited and impatient to migrate personal data to Apple's data center for easier access and sharing. Look, the service is cool and convenient. But when you give your information to icloud, should you pray for the security of the data? In Beijing June 7, 2011, Apple CEO Steve Jobs unveiled the icloud of Apple cloud services at Apple's Global developer conference WWDC 2011, marking Apple's entry into the cloud.

McAfee: Large data processing capability is the core of Siem

In the big data age, security needs to take the initiative now, every second a new sample of malware has emerged, and up to 83% of companies have been hit by a high level of ongoing threat-large data is not just a challenge for customers, but also for security vendors.   If the risk is equal to the threat multiplied by the assets multiplied by the loopholes, then the big data age, the risk is becoming more taboo. 2013 is a year of large-scale adoption of large data technology by companies, according to a report published by Gartner, 42% of IT executives say their companies have invested in large data technology or will ...

Risk and opportunity for password-free login sites

There are always a number of reasons to register a Web site, and there is only one source: a link for sustainable tracking. such as publishing content, add friends or online transactions. In addition, whether it is to read, or as a guest message, we all prefer not to register not to register, all seek Jane. To minimize the hassle of registering with users, the threshold for registration is now "deteriorating": just fill in the email and password.   More websites even send a random password to email (because sooner or later you're going to have to go to the mailbox to verify the activation). But can we go any further, simply by registering/logging in ...

Total Pages: 15 1 .... 4 5 6 7 8 .... 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

not found

404! Not Found!

Sorry, you’ve landed on an unexplored planet!

Return Home
phone Contact Us
not found

404! Not Found!

Sorry, you’ve landed on an unexplored planet!

Return Home
phone Contact Us

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.