search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
laptop providing
?
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(18)
News
(3)
Article
(1)
Keywords
« Previous
1
2
3
Next »
18%
Kick-start your AI projects with Kubeflow
26.01.2025
Home
»
Archive
»
2025
»
Issue 85: Monit...
»
_ACCOUNT=
export CLUSTER_REGION=eu-central-1 export CLUSTER_NAME=kubeflow-1 export
PROFILE
_NAME=kubeflow-user export
PROFILE
_CONTROLLER_POLICY_NAME=kubeflow-user eksctl create cluster --name ${CLUSTER
18%
Storage across the network with iSCSI and Synology DiskStation Manager
04.12.2024
Home
»
Archive
»
2024
»
Issue 84: Non-R...
»
under the General tab in the same group and concerns fan noise. Synology devices allow you to select from four performance
profiles
: Full-Speed Mode , Cool Mode , Quiet Mode , and Low-Power Mode
18%
Code IaC for provisioning of preconfigured virtual environments
26.01.2025
Home
»
Archive
»
2025
»
Issue 85: Monit...
»
} 22 } Custom Image Definition Next, I dive deeper into a template for defining a custom image for a VM (Listing 4). This template customizes a source platform image by specifying the VM
profile
18%
SC24 – Bursting at the Seams
07.01.2025
Home
»
HPC
»
Articles
»
-Wide Roofline
Profiling
– a Case Study on NERSC’s Perlmutter Supercomputer.” Figure 1: FLOP types at NERSC (cropped image from PMBS24 presentation by Si Hammond
18%
Security and automation with SBOMs
01.06.2024
Home
»
Archive
»
2024
»
Issue 81: Load...
»
on Vulnerability Exploitability eXchange (VEX), which was developed by the NTIA. VEX is implemented as a
profile
in the Common Security Advisory Framework (CASF) of OASIS Open and is supported by CycloneDX [5
18%
Storage trends for taming the flood of data
27.09.2024
Home
»
Archive
»
2024
»
Issue 83: Storage
»
by the vendor. The header defined by OCP for data section 1 contains basic information on the version,
profiles
, statistics (number of entries, which is vendor-specific), the number of FIFO buffers, the log
18%
News for Admins
01.06.2024
Home
»
Archive
»
2024
»
Issue 81: Load...
»
an organizational culture of AI risk management – build organizational structures that prioritize security. Map: Understand your individual AI use context and risk
profile
. Measure: Develop systems to assess
18%
A feature-rich drop-in-replacement for Microsoft Exchange
27.09.2024
Home
»
Archive
»
2024
»
Issue 83: Storage
»
and organizational resources, such as email, files, calendars, and user
profiles
. The Graph API offers a single endpoint which streamlines access to information from the entire Microsoft 365 ecosystem, removing
18%
ASM tools and strategies for threat management
26.01.2025
Home
»
Archive
»
2025
»
Issue 85: Monit...
»
: Detecting vulnerable assets Creating
profiles
and evaluating vulnerabilities Prioritizing checkpoints on the basis of risk assessment Monitoring vulnerabilities on an ongoing basis Fixing
18%
Securing the container environment
01.06.2024
Home
»
Archive
»
2024
»
Issue 81: Load...
»
computing (seccomp) [6] can limit the syscalls a container can call. A default seccomp
profile
is enabled by default (only if Docker has been built with seccomp and the kernel is configured with CONFIG
« Previous
1
2
3
Next »