search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(94)
Article
(29)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
4
5
6
7
8
9
10
11
12
13
Next »
23%
Remote desktop based on HTML5
31.10.2025
Home
»
Archive
»
2012
»
Issue 12: NAS S...
»
quickly view the password hash at the command line with the md5sum utility: # echo -
n
| md5sum -t 319f4d26e
3
c536b5dd871bb2c52e3178 - Next, add this hash value instead of the password
23%
Distributed storage with Sheepdog
07.10.2014
Home
»
Archive
»
2014
»
Issue 23: 10 Ti...
»
's S
3
. Scalability, (high) availability, and manageability were and still are the essential characteristics that Sheepdog seeks to provide. For Morita, setting up Ceph, which already existed at that time
23%
Exploring Kubernetes with Minikube
11.09.2018
Home
»
Archive
»
2018
»
Issue 47: Findi...
»
to Virtualization.'' Alternatives to Virtualization According to one very nicely written page [
3
], KVM will still work without the hardware extensions, but it will be much slower. It is also possible
23%
Service mesh for Kubernetes microservices
09.04.2019
Home
»
Archive
»
2019
»
Issue 50: Bpfilter
»
Version: networking.istio.io/v1alpha
3
02 kind: Gateway 03 metadata: 04 name: wordpress-gateway 05 spec: 06 selector: 07 istio: ingressgateway
08
servers: 09 - port: 10 number: 443 11 name: https
23%
Guacamole: Remote Desktop
04.02.2013
Home
»
Articles
»
with the md5sum utility: echo -
n
| md5sum -t 319f4d26e
3
c536b5dd871bb2c52e3178 - Next, add this hash value instead of the password to the configuration. Of course, the hashed password should
23%
Rethinking RAID (on Linux)
25.03.2021
Home
»
Archive
»
2021
»
Issue 62: Lean...
»
identified the following physical drives that I will be using in my examples: $ cat /proc/partitions |grep -e sd[c,d] -e nvm 259 0 244198584 nvme0
n
1 259 2 244197543 nvme0
n
1p1 8 32
23%
An IP-based load balancing solution
21.07.2011
Home
»
CloudAge
»
Articles
»
algorithms are round robin and least connected, which are most commonly used in LVS clusters. Configuring the Piranha Infrastructure Piranha [
3
] is a clustering product from Red Hat that is based on the LVS ...
3
23%
Aggregating information with Huginn
18.02.2018
Home
»
Archive
»
2018
»
Issue 43: Real...
»
"href": "http://www.linux-magazine.com/NEWS/Gartner-worldwide-server_sales_drop"
08
} 09 ], 10 "title": "Gartner: Worldwide server sales drop", 11 "content": "
\
n
23%
Many Clouds, One API
22.08.2011
Home
»
Articles
»
have been created over the last few years, including Amazon Elastic Compute Cloud (EC2), Amazon Simple Storage Service (S
3
), and JiffyBox. In the US, they are joined by providers such as Go
23%
Real World AWS for Everyone
18.02.2018
Home
»
Archive
»
2018
»
Issue 43: Real...
»
]. Create access key pairs for the required tenants/users. An AWS access key always has a key ID in the form of AKIAJ4 PMEXHFYUHIXG2A and a secret access key such as :/ONT0HapjmLw7xni 6FPscmvPZJ Sc75hUXAQI+
N
3
« Previous
1
...
4
5
6
7
8
9
10
11
12
13
Next »