19%
18.02.2018
for Internet Security (CIS) [3] – a kind of best practices guide for the use of containers (Figure 1).
Figure 1: Docker Bench for Security checks containers
19%
20.10.2013
: Z1F35P0G
LU WWN Device Id: 5 000c50 050b954c3
Firmware Version: CC27
User Capacity: 3,000,592,982,016 bytes [3.00 TB]
Sector Sizes: 512 bytes logical, 4096 bytes physical
Device is: In smartctl
19%
05.09.2011
for AWS APIs; therefore, Eucalyptus clouds can scale out to Amazon EC2. Eucalyptus also implements an Amazon S3-compliant storage component called Walrus. Walrus is primarily a virtual machine repository
19%
14.08.2017
to compress data files. Listing 1 shows a quick example illustrating the change in file size.
Listing 1
Gzip Example
$ ls -lsah FS_scan.csv
3.2M -rw-r--r-- 1 laytonjb laytonjb 3.2M 2014-06-09 20
19%
26.11.2013
ability of web browsers to encrypt and decrypt application data using JavaScript, is currently under review by the World Wide Web consortium (W3C) as a draft. This promising technology reaches well beyond
19%
02.02.2021
interacts with the environment as an agent, much like a sentient being (Figure 3). The agent has to explore the environment and typically only learns after a certain number of actions whether
19%
13.02.2017
, so I attended all three days of the conference and also cast my vote. I was at the venue every morning at 8:00am because, unlike previous years, they didn't have one long keynote on the first day
19%
17.02.2015
in the neighbor cache. Display the contents of this cache using the command:
netsh interface ipv6 show neighbor
If you are already in the right context, simply type show neighbor, or the short form sh n (Figure 3
19%
27.09.2021
Among the number of burgeoning Kubernetes distributions available today is the excellent production-ready K3s [1], which squeezes into a tiny footprint and is suitable for Internet of Things (Io
19%
13.02.2017
at level 3. To do this, each VLAN must have a connection to a router.
VLANs do not protect networks against spying or sniffing, although they can be monitored like switched networks using data analyzers (e