83%
16.05.2013
a9a6615fb5c045693 |
root@alice:~# quantum port-list
+--------------------------------------+------+-------------------+
| 0c478fa6-c12c-... | | fa:16:3e:29 ... 2013
83%
14.03.2013
.
Business Desktop Remix Examined
The 32- and 64-bit versions of the Business Desktop Remix for x86 systems are available for downloading after registration. Technically, Ubuntu Business Desktop 12 ... Ubuntu Business Desktop Remix 12.04 LTS ... 2013
83%
18.07.2013
quickly established itself in this ensemble. Nginx (pronounced "Engine X") can act as a reverse proxy, load balancer, and static server. The system is known for high performance, stability, and frugal ... 2013
82%
09.01.2013
/haproxy/www.example.com.pem
22 mode http
23 option httpclose
24 option forwardfor
25 reqadd X-Forwarded-Proto:\ https
26 default_backend web_server
27
28 backend web_server
29 mode http
30 balance roundrobin
31 ... 2013
82%
14.03.2013
Franklin
Some big changes are happening in the processor world right now. For the past 15 years or so, both the HPC world and the enterprise world have settled on, for the most part, x86 as the
processor ... 2013
82%
14.11.2013
. This translates to Google's experiencing about 25,000-75,000 correctable errors (CE) per billion device hours per megabit, which translates to 2,000-6,000 CE/GB-yr (or about 250-750 CE/Gb-yr). This is much higher ... 2013
82%
14.03.2013
to jail>;
10 j.hostname = ;
11 j.ip_number = ;
12 /* call system call */
13 i = jail(&j);
14 [...]
15 execv(, ...);
16 [...]
17 exit(0);
18 ... 2013
82%
18.07.2013
't want to spend your time translating between the options in different versions, so get the latest if you can. I'm only covering the latest version here, which, at the time of writing, is 2.7.x. Using ... 2013
82%
18.07.2013
. In 2013, Red Hat could become the first provider to implement an open, vendor-independent, hybrid cloud solution based exclusively on free software, which – besides its own products – also manages VMware ... 2013
81%
16.05.2013
, one-time passwords, or both. Certificate-based two-factor authentication typically uses digital PKI certificates based on the X.509 standard. These are typically stored on a hardware certificate storage ... 2013