28%
27.09.2024
if (doc.timestamp) {\n emit(doc.timestamp, null);\n }\n}"
},
"by-hours": {
"map": "function (doc) {\n if (doc.timestamp) {\n emit(doc.timestamp.substr(8,2), null);\n }\n
28%
30.01.2024
-IOV) implementation with a total of 15 different virtualization functions. Hardware support for various security functions in line with the Trusted Computing Group (TCG) Opal 2.0 specification is also part
28%
16.05.2013
sessions with Google Authenticator [17]. The Google Authenticator Project is released under the Apache License 2.0 and is freely available. A PAM module is available for the server; the Google Authenticator
28%
27.09.2024
, testing, and production. The hub VNet typically contains shared resources, such as firewalls (Figure 2) or VPN gateways, and manages traffic to and from each spoke VNet that hosts the Linux workloads
28%
26.01.2025
in the scope of Industry 4.0 or smart factory initiatives. Although cyber risk management is required by law (e.g., in NIS2), ASM is not. However, any company that becomes aware of attack surfaces as part of its
28%
30.11.2025
comparison in Table 1.
Table 1
Five Graph Databases
Name
Neo4j 1.6
Sones Graph DB 2.0
InfoGrid 2.9.5
HyperGraphDB 1.1
VertexDB
Homepage
http
28%
10.12.2013
and in heterogeneous environments. FreeNAS also supports AFP for Mac OS X environments, including Time Machine backups. Each service can be configured from its corresponding wrench icon (Figure 2
28%
08.01.2013
_LOCAL_MACHINE\System\CurrentControlSet\Services\LanManWorkstation\Parameters]
DWORD DomainCompatibilityMode 1
DWORD DNSNameResolutionRequired 0
The preceding code tells the registry to add two DWORD
28%
19.02.2013
formulated task, you can simply issue, for example, the rex apache2
command to install apache2 on all your web servers and kit them out with the appropriate configuration files at the same time.
By the way
28%
05.03.2013
and then run the interpreter against the file (Figure 2):
coffee hello.coffee
Figure 2: The command-line tools in action: first, the interpreter executes