Home | The Permanent Legacy Foundation - The Permanent Legacy Foundation

  • graphroot
  • 7 months ago

StorageOS | Cloud Native Storage for Containers

  • graphroot
  • 10 months ago

OpenEBS

  • graphroot
  • a year ago

ncw/rclone

  • graphroot
  • 2 years ago

libopenstorage/stork

  • graphroot
  • 2 years ago

rexray/rexray

  • graphroot
  • 2 years ago

Distributed Storage Systems - Cap / Dynamo

  • graphroot
  • 2 years ago

parquet.apache.org

  • graphroot
  • 2 years ago

Big Data Storage Wars: Ceph vs Gluster | TechnologyAdvice

  • graphroot
  • 2 years ago

Persistent storage for containers

  • graphroot
  • 2 years ago

Free OKR, PPP and KPI manager for small startup teams in Google Sheets

  • graphroot
  • 2 years ago

Measure What Matters Most: A Marketer's Guide

  • graphroot
  • 2 years ago

Mobile-First KPI Dashboards for Business | Databox

  • graphroot
  • 3 years ago

Funnel | Automated Data Collection & Marketing Reporting

  • graphroot
  • 3 years ago

OKR Goals - Objectives and Key Results - Focused Overview

  • graphroot
  • 3 years ago

OKR Software Guide: Overview to find the best OKR tool for you

  • graphroot
  • 3 years ago

Objectives and Key Results (OKRs)

  • graphroot
  • 3 years ago

What Are the Essential KPIs for Professional Services Organizations?

  • graphroot
  • 3 years ago

5 KPIs Every Professional Services Firm Should Track

  • graphroot
  • 3 years ago

5 Professional Services KPIs Driving Steady Growth, Financial Success

  • graphroot
  • 3 years ago

The New App: Sources and Destinations

  • graphroot
  • 3 years ago

product

  • graphroot
  • 8 months ago

scylladb/scylla

  • graphroot
  • 2 years ago

cloud

  • graphroot
  • 3 months ago

Cloud Infrastructure Security, AWS Security Monitoring - Dome9

  • graphroot
  • 3 months ago

www.cloudpassage.com

  • graphroot
  • 3 months ago

Coarse-grained vs. fine-grained access control - part I - Harvesting web technologies

  • graphroot
  • 7 months ago

We secured thousands of Cassandra clients to keep Monzo's data safe

  • graphroot
  • 10 months ago

Hardening Cassandra Step by Step - Part 1 Inter-Node Encryption (And a Gentle Intro to Certificates)

  • graphroot
  • a year ago

Securing Cassandra for Compliance

  • graphroot
  • a year ago

Secure Cassandra Cluster

  • graphroot
  • a year ago

Setting up client and cluster SSL transport for a Cassandra cluster

  • graphroot
  • a year ago

The Data Detox Kit: Learn the Essentials

  • graphroot
  • a year ago

ansible-duo-security.html

  • graphroot
  • a year ago

Role Based Access Control in One Line Posted: 2012-10-13

  • graphroot
  • a year ago

Controlling access to Graph keyspaces

  • graphroot
  • a year ago

eevans/cassandra-ca-manager

  • graphroot
  • a year ago

Open Source Identity and Access Management

  • graphroot
  • 2 years ago

Home – Threat Stack

  • graphroot
  • 2 years ago

cossacklabs/acra

  • graphroot
  • 2 years ago

Secure remote access, auditing, and compliance - Tehama

  • graphroot
  • 2 years ago

Kubernetes Security, Docker Security, OpenShift Security & More

  • graphroot
  • 2 years ago

Cloud Native Security | Alcide Security Platform

  • graphroot
  • 2 years ago

Kubernetes Category

  • graphroot
  • 2 years ago

aporeto-inc/trireme-lib

  • graphroot
  • 2 years ago

Manage Cloud Security Risks | AWS, VMware, IBM | HyTrust

  • graphroot
  • 2 years ago

cilium/cilium

  • graphroot
  • 2 years ago

Home

  • graphroot
  • 2 years ago

cloudurable/cassandra-image

  • graphroot
  • 2 years ago

Cassandra - Database - Secrets Engines - Vault by HashiCorp

  • graphroot
  • 2 years ago

DSE 5.1 Resource Manager, Part 1 – Network Connections Security

  • graphroot
  • 2 years ago

securing-cassandra

  • graphroot
  • 2 years ago

Hardening Cassandra Step by Step - Part 1 Inter-Node Encryption (And a Gentle Intro to Certificates)

  • graphroot
  • 2 years ago