search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(156)
Article
(47)
News
(13)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
9
10
11
12
13
14
15
16
17
18
19
20
21
22
Next »
17%
Better compression of web pages
22.12.2017
Home
»
Archive
»
2017
»
Issue 42: Secur...
»
and Brotli Comparison 01 -rw-r--r-- 1 sw sw 124 8 Sep 16:
52
hello-world.html 02 -rw-r--r-- 1 sw sw 77 8 Sep 16:53 hello-world.html.br 03 -rw-r--r-- 1 sw sw 113 8 Sep 16:53 hello
17%
First steps in IT automation by Rex
11.06.2014
Home
»
Archive
»
2014
»
Issue 21: Manag...
»
on the Rex host and then copy the public key over to the client (Listing
3
). After that, a test login on the client without password should work. Listing
3
Key-Based Authentication 01 root
17%
Getting the most from your cores
11.10.2016
Home
»
Archive
»
2016
»
Issue 35: Persi...
»
, the exact details of these components varies from processor to processor, making CPU utilization comparison difficult. Current processors can have shared L
3
caches across all cores or shared L2 and L1 caches
17%
Udev with virtual machines
14.11.2013
Home
»
Archive
»
2013
»
Issue 17: Cloud...
»
kernel ordinal number (%n). Listing
3
70-persistent-net.rules Rules for KVM: SUBSYSTEM=="net", ACTION=="add", DRIVERS=="?*", ATTR{address}=="
52
:54:00:*", KERNEL=="eth*", NAME="eth%n" Rules
17%
Embarrassingly parallel computation
01.06.2024
Home
»
Archive
»
2024
»
Issue 81: Load...
»
is considered "embarrassingly parallel" [
3
] where no design effort is required to partition the problem into completely separate parts. If no data dependency exists between the problem sub-parts, no communication
17%
Tech News
27.09.2024
Home
»
Archive
»
2024
»
Issue 83: Storage
»
and theft in non-production environments, while 53 percent reported data corruption and alteration, and
52
percent cited audit issues and failures. Read more at Delphix (https://www
17%
A closer look at hard drives
18.07.2013
Home
»
Archive
»
2013
»
Issue 15: What’...
»
buffered disk reads: 616
MB
in
3
.00 seconds = 205.03
MB
/sec $ hdparm -T /dev/sda /dev/sda: Timing cached reads: 6292
MB
in 2.00 seconds = 3153.09
MB
/sec If this were a spinning disk, you would also
17%
Controlling virtual machines with VNC and Spice
14.03.2013
Home
»
Archive
»
2013
»
Issue 13: IPv6...
»
52
). Figure 2: QXL driver problems on Windows 7. Conclusions The graphics system plays a subordinate role in server use scenarios; in fact
17%
Throw Down the Gauntlet
14.08.2018
Home
»
Archive
»
2018
»
Issue 47: Findi...
»
"/>
52"/>
3"/>
17%
Security as Code
04.10.2018
Home
»
Archive
»
2018
»
Issue 47: Findi...
»
="filtered" reason="no-response" reason_ttl="0"/>
« Previous
1
...
9
10
11
12
13
14
15
16
17
18
19
20
21
22
Next »