search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(152)
Article
(49)
News
(2)
Blog post
(1)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
14
15
16
17
18
19
20
21
9%
Let the hardware do the heavy lifting
09.06.2018
Home
»
Archive
»
2018
»
Issue 45: Autom...
»
for the foreseeable future. Hardware assistance with tasks has the additional benefit of lowering system costs tremendously (every 10% increase in CPU ~ $
500
in acquisition costs) and allowing the user to trade CPU
9%
Darshan I/O analysis for Deep Learning frameworks
27.09.2021
Home
»
Archive
»
2021
»
Issue 65: 7 Em...
»
08 integer :: counter 09 integer :: counter_limit 10 integer :: ierr 11
12
type(rec) :: my_record 13 14 counter_limit = 2000 15 16 ierr = -1 17 open(unit=8,file
9%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home
»
Archive
»
2013
»
Issue 14: Samba 4
»
authentication on the basis of text messages. Zyxel [
6
], the Taiwanese network equipment manufacturer, has a two-factor authentication solution in its portfolio. It provides VPN access to the company's own Zy
9%
The pros and cons of a virtual desktop infrastructure
12.09.2013
Home
»
Archive
»
2013
»
Issue 16: Docker
»
. The reality is rather different. The thin client breakthrough has been announced several times under different headings and has never really happened. A survey by DataCore of nearly
500
IT professionals around
« Previous
1
...
14
15
16
17
18
19
20
21