search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
laptop providing
?
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(14)
Article
(3)
News
(1)
Keywords
« Previous
1
2
18%
Storage across the network with iSCSI and Synology DiskStation Manager
04.12.2024
Home
»
Archive
»
2024
»
Issue 84: Non-R...
»
under the General tab in the same group and concerns fan noise. Synology devices allow you to select from four performance
profiles
: Full-Speed Mode , Cool Mode , Quiet Mode , and Low-Power Mode
18%
Code IaC for provisioning of preconfigured virtual environments
26.01.2025
Home
»
Archive
»
2025
»
Issue 85: Monit...
»
} 22 } Custom Image Definition Next, I dive deeper into a template for defining a custom image for a VM (Listing 4). This template customizes a source platform image by specifying the VM
profile
18%
SC24 – Bursting at the Seams
07.01.2025
Home
»
HPC
»
Articles
»
-Wide Roofline
Profiling
– a Case Study on NERSC’s Perlmutter Supercomputer.” Figure 1: FLOP types at NERSC (cropped image from PMBS24 presentation by Si Hammond
18%
Storage trends for taming the flood of data
27.09.2024
Home
»
Archive
»
2024
»
Issue 83: Storage
»
by the vendor. The header defined by OCP for data section 1 contains basic information on the version,
profiles
, statistics (number of entries, which is vendor-specific), the number of FIFO buffers, the log
18%
A feature-rich drop-in-replacement for Microsoft Exchange
27.09.2024
Home
»
Archive
»
2024
»
Issue 83: Storage
»
and organizational resources, such as email, files, calendars, and user
profiles
. The Graph API offers a single endpoint which streamlines access to information from the entire Microsoft 365 ecosystem, removing
18%
Simplify your migration from Docker to Podman
26.03.2025
Home
»
Archive
»
2025
»
Issue 86: Data...
»
similarities: Podman and Docker draw on the capabilities of the Linux kernel and seccomp
profiles
to control process authorizations. Both environments can also configure robust security. That said, you
18%
Networking strategies for Linux on Azure
27.09.2024
Home
»
Archive
»
2024
»
Issue 83: Storage
»
configuring DNS settings to point to the Traffic Manager
profile
, which then directs traffic according to the specified routing method. This setup provides a resilient and flexible way to manage global traffic
18%
ASM tools and strategies for threat management
26.01.2025
Home
»
Archive
»
2025
»
Issue 85: Monit...
»
: Detecting vulnerable assets Creating
profiles
and evaluating vulnerabilities Prioritizing checkpoints on the basis of risk assessment Monitoring vulnerabilities on an ongoing basis Fixing
« Previous
1
2