search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(200)
Article
(55)
News
(12)
Blog post
(1)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
Next »
16%
Getting the most from your cores
11.10.2016
Home
»
Archive
»
2016
»
Issue 35: Persi...
»
, the exact details of these components varies from processor to processor, making CPU utilization comparison difficult. Current processors can have shared L
3
caches across all cores or shared L2 and L1 caches
16%
Udev with virtual machines
14.11.2013
Home
»
Archive
»
2013
»
Issue 17: Cloud...
»
kernel ordinal number (%n). Listing
3
70-persistent-net.rules Rules for KVM: SUBSYSTEM=="net", ACTION=="add", DRIVERS=="?*", ATTR{address}=="
52
:54:00:*", KERNEL=="eth*", NAME="eth%n" Rules
16%
Embarrassingly parallel computation
01.06.2024
Home
»
Archive
»
2024
»
Issue 81: Load...
»
is considered "embarrassingly parallel" [
3
] where no design effort is required to partition the problem into completely separate parts. If no data dependency exists between the problem sub-parts, no communication
16%
Tech News
27.09.2024
Home
»
Archive
»
2024
»
Issue 83: Storage
»
and theft in non-production environments, while 53 percent reported data corruption and alteration, and
52
percent cited audit issues and failures. Read more at Delphix (https://www
16%
A closer look at hard drives
18.07.2013
Home
»
Archive
»
2013
»
Issue 15: What’...
»
buffered disk reads: 616
MB
in
3
.00 seconds = 205.03
MB
/sec $ hdparm -T /dev/sda /dev/sda: Timing cached reads: 6292
MB
in 2.00 seconds = 3153.09
MB
/sec If this were a spinning disk, you would also
16%
Controlling virtual machines with VNC and Spice
14.03.2013
Home
»
Archive
»
2013
»
Issue 13: IPv6...
»
52
). Figure 2: QXL driver problems on Windows 7. Conclusions The graphics system plays a subordinate role in server use scenarios; in fact
16%
Checking password complexity with John the Ripper
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1
MB
) and simple
16%
Throw Down the Gauntlet
14.08.2018
Home
»
Archive
»
2018
»
Issue 47: Findi...
»
"/>
52"/>
3"/>
16%
Security as Code
04.10.2018
Home
»
Archive
»
2018
»
Issue 47: Findi...
»
="filtered" reason="no-response" reason_ttl="0"/>
16%
How to query sensors for helpful metrics
22.05.2023
Home
»
Archive
»
2023
»
Issue 75: Teamwork
»
need a server with a network bridge and a Podman network of the Bridge [
3
] type. You will find various how-tos online to help you create a bridged container network of the macvlan type. However, if you
« Previous
1
...
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
Next »