search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%xcode%3 00s Llorente"22
?
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(1047)
Article
(333)
News
(112)
Blog post
(5)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
143
144
145
146
147
148
149
150
15%
Linux I/O Schedulers
02.03.2018
Home
»
Archive
»
2018
»
Issue 44: Cloud...
»
from a NOOP I/O scheduler. Anticipatory The anticipatory I/O scheduler [
3
] was the default scheduler a long time ago (in kernel years). As the name implies, it anticipates subsequent block requests
15%
Interview with the developer of Singularity
15.08.2016
Home
»
Archive
»
2016
»
Issue 34: Softw...
»
Layton: Hi Greg. Tell me bit about yourself and your background. Gregory M. Kurtzer: My work with Linux began back in the mid-90
s
, after I obtained my degree in biochemistry and focused early on genomics
15%
Open source ticket system
26.03.2025
Home
»
Archive
»
2025
»
Issue 86: Data...
»
. The platform also comes with secure email communication that supports OAuth 2.0 for POP
3
and IMAP email protocols to enable modern and secure authentication for the retrieval of email from services
15%
Vulnerability assessment best practices for enterprises
16.08.2018
Home
»
Archive
»
2018
»
Issue 46: CMS S...
»
considerations into their business continuity planning? Is cybersecurity incorporated into the annual exercise, either in the form of a live exercise or a tabletop exercise? Are the system(
s
) within
15%
Nothing works without a profile
10.06.2015
Home
»
Archive
»
2015
»
Issue 27: Fault...
»
V\Client\Packages\
\REGISTRY\USER\
\ HKCU\Software\Microsoft\AppV\Client\PackageGroups\
\REGISTRY\USER\
\ Example:HKCU\Software\Microsoft\AppV\Client\Packages\4FE4455B-E307-4D62-A29C4912D8AB8F38\REGISTRY\USER\
S
15%
Designing a Secure Active Directory
26.03.2025
Home
»
Archive
»
2025
»
Issue 86: Data...
»
information, such as home drives or Windows Local Administrator Password Solution (LAPS). According to MITRE ATT&CK [
3
], attackers derive their techniques from these three AD functions and deploy them
15%
The pros and cons of a virtual desktop infrastructure
12.09.2013
Home
»
Archive
»
2013
»
Issue 16: Docker
»
shares, including vWorkspace [
3
] and Pano Logic [4]. What VDI Means When you consider all the benefits, you might expect virtual desktops to be used in environments at least a few dozen clients
« Previous
1
...
143
144
145
146
147
148
149
150