search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(141)
Article
(37)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
5
6
7
8
9
10
11
12
13
14
15
16
17
18
Next »
13%
Develop a simple scanning application with the NAPS2 SDK
27.05.2025
Home
»
Archive
»
2025
»
Issue 87: Light...
»
ScanOptions 21 {
22
Device = device, 23 PaperSource = PaperSource.Feeder, 24 PageSize = PageSize.A4,
25
Dpi = 300 26 }; 27 28 var images = new List
13%
Machine learning and security
02.02.2021
Home
»
Archive
»
2021
»
Issue 61: Secur...
»
.sin(periods * 2 * np.pi * t)
12
return max(value, 0.0) 13 else: 14 value = np.sin(periods * 2 * np.pi * t) 15 return max(value, 0.0) 16 17 # building the data vector 18 my_data = [] 19 i = 0
20
while
13%
Sharing Data with SSHFS
23.04.2014
Home
»
HPC
»
Articles
»
as a module): [laytonjb@home4 HPC_028]$ ls -lsa /lib/modules/2.6.32-431.5.1.el6.
x
86_64/kernel/fs/fuse total 168 4 drwxr-xr-
x
2 root root 4096 Mar
20 20
:09 ./ 4 drwxr-xr-
x
30 root root 4096 Mar
20 20
13%
Improving performance with environment variables
02.08.2021
Home
»
Archive
»
2021
»
Issue 64: Bare...
»
,048 0.776039
22
.137891 1.612694 10.652902 0.199173 86.256026 0.455025 37.755903 4,096 5.855209 23.472936
12
.275261 11
13%
Network monitoring with Icinga and Raspberry Pi
17.02.2015
Home
»
Archive
»
2015
»
Issue 25: Safe...
»
generic-service 21 host_name ubuntusrv
22
service_description Current Users 23 check_command check_nrpe!check_users!
20
!50 24 }
25
26 define ...
25
13%
SSL/TLS best practices for websites
07.10.2014
Home
»
Archive
»
2014
»
Issue 23: 10 Ti...
»
AES128-GCM-SHA256 \ 19 AES256-GCM-SHA384 \
20
AES128-SHA \ 21 AES256-SHA \
22
DES-CBC3-SHA" 23 24 # Only with Apache 2.2.24+ and Apache 2.4.3+
25
SSLCompression Off 26 27 SSLSessionCache shmcb
13%
Wireshark
27.11.2011
Home
»
Articles
»
needs direct access to the hardware and thus typically runs with root privileges. The exceptions are Mac OS
X
and Solaris, where the user only needs access privileges for the network interface card device
13%
Monitoring container clusters with Prometheus
09.10.2017
Home
»
Archive
»
2017
»
Issue 41: Kuber...
»
in turn stores as a separate time series. The software can already cope with millions of time series, yet version
2.0
[6] should cover more extreme Kubernetes environments with thousands of nodes
13%
OpenLDAP Workshop
11.06.2014
Home
»
Archive
»
2014
»
Issue 21: Manag...
»
objectClass: person
20
objectClass: organizationalPerson 21 objectClass: inetOrgPerson
22
objectClass: posixAccount 23 cn: Ulrich Habel 24 gidNumber: 100
25
homeDirectory: /home/uhabel 26 sn: Habel 27 uid
13%
Update your Docker containers safely
07.06.2019
Home
»
Archive
»
2019
»
Issue 51: Self-...
»
this script, please let me know, preferably in Python 06 # hanscees@AT@hanscees.com 07 # modified from https://gist.github.com/cirocosta/17ea17be7ac11594cb0f290b0a3ac0d1
x
08 09 set -o errexit 10 11 main() {
12
« Previous
1
...
5
6
7
8
9
10
11
12
13
14
15
16
17
18
Next »