11%
07.01.2014
of space (20 + 25 + 30), with no doubt lots of duplicated data wasting space and money.
The backup world uses a few techniques that differentiate it from replication. The first is called a “full backup
11%
30.01.2013
approaches called “Flat Naming Scheme” or “Hierarchical Naming Scheme.”
In the Flat Naming Scheme, you create modules with names that have all of the details on the build tools in the name itself. For example
11%
30.03.2012
interface is used for this. In kernel versions prior to 2.6.24, the service itself tries to sniff and parse the advertisements. The daemon is called rdnssd
and comes with the Ndisc6 package, which includes
11%
10.04.2012
that different organizations can actually share what we call application definitions and then only have to configure the very site-specific stuff for a particular set of applications.
AM: Compute Manager
11%
12.02.2013
the currently loaded modules in an environment variable called LOADEDMODULES
. For example, if I load two modules (ftw
and mpich2
) and then look at my environment, I will find:
LOADEDMODULES=fftw/3.3.2/gnu4
11%
15.04.2013
at several conferences and investigated for potential vulnerabilities. Besides the obvious reasons, calls to pay more attention to the subject in general had become more insistent. Cryptographic hash functions
11%
30.07.2014
Graphite is hierarchically structured, real-time graphing system (Figure 1). A client collects data from the source, and a Graphite daemon on TCP port 2003 called Carbon receives the data and stores
11%
12.01.2012
Flash to prototype alternative node designs and inform vendors about design alternatives for the DOE exascale program. This new project is called CoDEx (CoDesign for Exascale).
It is repurposing
11%
30.04.2012
can run a packet sniffer on the target system after you allow your team member to obtain a meterpreter shell. This meterpreter script is called packetrecorder
and allows some more granularities when
11%
05.12.2014
In this era of massive computing environments, cloud services, and global infrastructure, it is reasonable to call data "big," although this is the first and last time I'll do so in this article