16%
01.08.2019
Box Linux simply contains too many tools to examine at any great level of detail. Certainly, it's a mature security toolkit that first appeared as a September 2010 release candidate. At the time of writing
16%
13.06.2016
the free command reveals its current size (Listing 1). At first glance, 2.7GB of 7.7GB of RAM is available to the system. If the RAM usage for the page cache is deducted, then actually 5.6GB is free
16%
28.07.2025
from serial CPU logic to CPU instructions operating on multiple data (such as AVX [6]) or a GPU's finer grained parallelism. Many strategies are liable to backfire when switching the underlying choices
16%
29.09.2020
AgentX module [6], but it hasn't been maintained since 2010 and has several deficits.
For this reason, I decided to develop my own open source Python module, python-netsnmpagent
[7]. Written in Python
15%
26.10.2012
Individual sources report that more than 286 million new, positively identified malware instances were registered in 2010 alone, not counting unreported cases (i.e., malware that cannot be detected
15%
07.10.2014
data growth on the log partition of a database. Such symptoms can be triggered by a single faulty ActiveSync client. A well-known example was a now-fixed bug in Apple iOS 6.1, with which a single i
15%
14.11.2013
NAS [1] began to take shape as an actual product. It came to include a range of services, from file sharing to media streaming.
By 2010, however, Cochard-Labbé was no longer able to commit sufficient time
15%
14.11.2013
DistributionGroups management role group in Exchange Server 2010/2013 can add or remove members of certain distribution groups and remove and create distribution groups.
These are the kinds of operations that administrators
15%
17.06.2017
Manager (ILM) 2007 and was a merger of the Microsoft Identity Integration Server (MIIS) and Certificate Lifecycle Manager (CLM) tools. In 2010, Microsoft integrated the products into the Forefront range
15%
30.11.2025
Individual sources report that more than 286 million new, positively identified malware instances were registered in 2010 alone [1], not counting unreported cases (i.e., malware that cannot