70%
21.08.2014
}
The next step is to define a service template related to the notification (Listing 6). This template defines how often to send notifications in case of warning or critical status: Once a day is sufficient ... 22
70%
21.08.2014
=TSM
HP Data Protector
BACKUP=DP
Symantec NetBackup
BACKUP=NBU
Duplicity/Duply
BACKUP=DUPLICITY (still experimental)
CommVault Galaxy 5, 6 and 7
BACKUP ... 22
70%
21.08.2014
.1.3
Running hypervisor: QEMU 1.6.1
If access works, a few lines of Python are all you need to retrieve the desired information (Listing 2). The hypervisor hosts are defined in the hv array. In the following ... 22
70%
21.08.2014
Catalog
in the General
tab to remove the services for the old domain controller.
To downgrade a domain controller, your best bet is to use the PowerShell Uninstall ADDSDomainController Cmdlet (Figure 6 ... 22
70%
21.08.2014
now easily and securely access your AWS resources with MFA enabled. Gemalto offers two supported devices.
The Ezio Time-based 6-Digit Token ... 22
70%
21.08.2014
[6]
Julia (up and coming) [7]
Java [8]
Matlab [9] and Matlab-compatible tools (Octave [10], Scilab [11], etc.)
Java is the lingua franca of MapReduce [12] and Hadoop [13]. Many toolkits ... 22
69%
30.11.2025
) is a Cray XT5-HE system called Jaguar. It is installed at the Oak Ridge National Laboratory, Tennessee, and has a 1.75-petaflop performance benchmark. Other top US systems include: Cielo, a Cray XE6 at Los ... 6
68%
30.11.2025
to admit that Linux didn't offer this feature. But in 2006, Rohit Seth started to develop this functionality, and as of kernel 2.6.24, administrators can use it. Originally referred to as "process containers ... 6
68%
30.11.2025
Destination MAC address
Listing 1
Nemesis arp Packets
01 $ while true
02 > do
03 > sudo nemesis arp -v -r -d eth0 -S 192.168.1.2 -D 192.168.1.133 -h 00:22:6E:71:04:BB -m 00:0C:29:B2 ... 6
68%
30.11.2025
100
0.067
95
23
5
10
99
0.099
96
22
6
20
94
0.210
97
22
6
Unfortunately ... 6