search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(199)
Article
(46)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
Next »
24%
Hardware suitable for cloud environments
30.11.2020
Home
»
Archive
»
2020
»
Issue 60: Secur...
»
to
400
Gbps per port (Figure 2). In this way, you can build a typical spine-leaf architecture. Each rack acts as a separate Layer 2 domain, and the switches use internal (i)BGP and route the traffic between
24%
SC24 – Bursting at the Seams
07.01.2025
Home
»
HPC
»
Articles
»
SC24 took place in Atlanta, GA, November 17-22. As I'm writing this, 17,959 attendees – that’s
3
,000+ more than last year – registered. More than 500 companies filled the exhibition floor, which
24%
Setting up FreeNAS
17.02.2015
Home
»
Archive
»
2015
»
Issue 25: Safe...
»
. FreeNAS does require some hardware planning, but it is well documented. Because the system is based on FreeBSD 9.
3
[
6
], you can find lots of details on the FreeBSD Hardware Compatibility List [7]. If you
24%
SmartOS as a virtualization platform
20.03.2014
Home
»
Archive
»
2014
»
Issue 19: Perim...
»
": 2048, 07 "resolvers": ["192.168.111.254"], 08 "disks": [ 09 { 10 "image_uuid": "1fc068b0-13b0-11e2-9f4e-2f
3
f
6
a96d9bc", 11 "boot": true, 12 "model": "virtio" 13 } 14 ], 15
24%
Embarrassingly parallel computation
01.06.2024
Home
»
Archive
»
2024
»
Issue 81: Load...
»
PI resulting in a brief burst of computation on cores 0, 1, and
6
(Figure 4) and an approximation of pi (purely out of randomness and geometry) to
3
.139, computed in just half a second (Figure 5). Executing
24%
Reducing the Attack Surface in Windows
04.12.2024
Home
»
Archive
»
2024
»
Issue 84: Non-R...
»
applications from creating child processes No d4f940ab-401b-4efc-aadc-ad5f
3
c50688a Blocks credential theft from the local security authority subsystem (lsass.exe) Yes 9e
6
c4e1f
24%
First steps in IT automation by Rex
11.06.2014
Home
»
Archive
»
2014
»
Issue 21: Manag...
»
on the Rex host and then copy the public key over to the client (Listing
3
). After that, a test login on the client without password should work. Listing
3
Key-Based Authentication 01 root
24%
The SDFS deduplicating filesystem
03.12.2015
Home
»
Archive
»
2015
»
Issue 30: OpenD...
»
: mkfs.sdfs --volume-name=pool
3
--volume-capacity=
400
GB \ --chunk-store-local false --cluster-block-replicas=
3
If a DSE fails, the others step in to take its place. However, this replication has
24%
A ptrace-based tracing mechanism for syscalls
06.10.2022
Home
»
Archive
»
2022
»
Issue 71: Kuber...
»
_PRELOAD, as well. libiotrace: Just Another Profiling Tool? A typical CPU computes data faster than data can be fetched from or stored to main memory (the so-called memory wall) [
3
]. Storage only exacerbates
24%
Security as Code
04.10.2018
Home
»
Archive
»
2018
»
Issue 47: Findi...
»
="filtered" reason="no-response" reason_ttl="0"/>
« Previous
1
...
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
Next »