search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(1067)
Article
(329)
News
(245)
Blog post
(4)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
Next »
11%
Accessing Fortran code with Python
05.12.2019
Home
»
Archive
»
2019
»
Issue 54: NVMe...
»
, the Python module is secretcode. Listing 4 Testing the Code $ python3 Python 3.7.3 (default, Mar 27 2019, 22:11:17) [GCC 7.3.
0
] :: Anaconda, Inc. on linux Type "help", "copyright", "credits
11%
Central logging for Kubernetes users
30.01.2020
Home
»
Archive
»
2020
»
Issue 55: AWS L...
»
principle – the Promtail instances send their data to Loki. Graphics with Grafana Because Loki comes from the Grafana developers, the aggregated log data is only displayed with this tool. Grafana version 6.
0
11%
Protect Azure resources with Network Security Groups
06.10.2019
Home
»
Archive
»
2019
»
Issue 53: Secur...
»
-AzureRmNetworkSecurityRuleConfig -Name "AllowFTP" -Description "Allow FTP port in for FTP server VM" -Protocol Tcp -SourcePortRange "*" -DestinationPortRange "21" -SourceAddressPrefix "*" -DestinationAddressPrefix "10.
0
.4.4" -Access
11%
Open source intelligence tools for pen testing
09.06.2018
Home
»
Archive
»
2018
»
Issue 45: Autom...
»
now have interfaces, including Nmap. Figure 3 shows a typical Nmap scan using the OSScan option (-
0
) that you've seen a thousand times. Notice with this particular scan that Nmap is having a hard time
11%
Professional PowerShell environments
09.06.2018
Home
»
Archive
»
2018
»
Issue 45: Autom...
»
List 'install YourService "C:\Windows\System32\WindowsPowerShell\v1.
0
\PowerShell.exe" "-command "& { .D:\Scripts\discheck.ps1}"" ' -NoNewWindow -Wait The PowerGUI editor offers the option to compile a script
11%
Boosting Performance with Intel’s QuickAssist Technology
13.06.2016
Home
»
Archive
»
2016
»
Issue 33: IPv6...
»
: cat /proc/icp_dh895xcc_dev
0
/cfg_debug Handle the user configuration defined in the configuration file. The Service Access Layer (SAL) in turn creates and starts the acceleration services. Two
11%
IoT for IT
15.08.2016
Home
»
Archive
»
2016
»
Issue 34: Softw...
»
-comes-after-email/422625/ "John Chambers last keynote as CEO of CISCO," Cisco Live 2015, San Diego, CA, https://www.youtube.com/watch?v=ujBLqLFNr
0
s (timeline 28:00) Cisco-Kansas City agreement: https
11%
Supercomputing Conference 2024
26.01.2025
Home
»
Archive
»
2025
»
Issue 85: Monit...
»
's Perlmutter Supercomputer. IEEE, 2024: DOI 10.1109/SCW63240.2024.00180: https://conferences.computer.org/sc-wpub/pdfs/SC-W2024-6oZmigAQfgJ1GhPL
0
yE3pS/555400b391/555400b391.pdf Open OnDemand: https
11%
High-performance load balancing
01.06.2024
Home
»
Archive
»
2024
»
Issue 81: Load...
»
>node = eth
0
>"
lb = eth1
Note that a minimal Seesaw configuration must contain at least five pieces of information: anycast_enabled: A value of True enables anycast
11%
Tech News
27.09.2024
Home
»
Archive
»
2024
»
Issue 83: Storage
»
and Orchestration The U.S. National Security Agency (NSA) has issued guidance on "Advancing Zero Trust Maturity Throughout the Automation and Orchestration Pillar" (https://media.defense.gov/2024/Jul/10/2003500250/-1/-1/
0
« Previous
1
...
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
Next »