17%
13.02.2017
, so I attended all three days of the conference and also cast my vote. I was at the venue every morning at 8:00am because, unlike previous years, they didn't have one long keynote on the first day
17%
07.04.2022
security misconfigurations. I'll showcase how it would be possible for an attacker to use those IAM misconfigurations and create serious hassles.
Big Deal?
AWS IAM [3] lets you manage access to AWS
17%
17.02.2015
in the neighbor cache. Display the contents of this cache using the command:
netsh interface ipv6 show neighbor
If you are already in the right context, simply type show neighbor, or the short form sh n (Figure 3
17%
27.09.2021
Among the number of burgeoning Kubernetes distributions available today is the excellent production-ready K3s [1], which squeezes into a tiny footprint and is suitable for Internet of Things (Io
17%
13.02.2017
at level 3. To do this, each VLAN must have a connection to a router.
VLANs do not protect networks against spying or sniffing, although they can be monitored like switched networks using data analyzers (e
17%
27.09.2021
[2] (section 3.2). Next, I built the Darshan utilities (darshan-util) with the command:
./configure CC=gcc --prefix=[binary location]
Because I'm running these tests on an Ubuntu 20.04 system, I had
17%
12.09.2013
show shows you the low-level information about the interfaces (Figure 3) in a similar way to ip address. Using
ip -s link show
gives you a statistical overview of the available interfaces, which can
17%
31.05.2012
_mat_stat
3.37
39.34
11.64
54.54
22.07
8.12
rand_mat_mul
1.00
1.18
0.70
1.65
8.64
41.79
Table 1: Benchmark Times
17%
30.05.2021
to reduce the zoom, use the m
key to "minimize" (Figure 3). Think of it as zooming in and out in your web browser. If you like, you can zoom in on all the charts with the plus (+
) key. Likewise, you can
17%
18.08.2021
, the command I used for Darshan to gather I/O statistics on the application was:
env LD_PRELOAD=/home/laytonjb/bin/darshan-3.3.1/lib/libdarshan.so ./ex1
I copied the Darshan file from the log location