About FIPS 140-2 Compliance in Kong Gateway FIPS implementation Password hashing Non-cryptographic usage of cryptographic algorithms SSL client About FIPS 140-2 Compliance i...
About FIPS 140-2 Compliance in Kong Gateway FIPS implementation Password hashing Non-cryptographic usage of cryptographic algorithms SSL client About FIPS 140-2 Compliance i...
v2.1 to 2.2 Upgraded Helm Version Support for private repo SSH keys using the SHA-1 signature hash algorithm is removed in 2.2.12 Workaround v2.1 to 2.2 Upgraded Helm Versio...
Algorithm Sharding Encryption Read/Write Splitting Load Balancer Shadow DB High Availability Algorithm Sharding # sharding-algorithm-name is specified by users and its pro...
8.15 EMULATOR vs REAL PHONE: Android Malware Detection Using Machine Learning What is your take-away message from this paper What are motivations for this work malware anti-emula...