39%
20.08.2012
service using Ncat and receive a timely response back, all you need to do is:
# ncat localhost 1313
Sat Apr 21 13:47:57 BST 2012
On Ubuntu/Debian Ncat is available via the nmap
package, so you can
39%
21.12.2017
inauguration in 2012, SuperMUC clocked in at around 3 PFLOPS and was once the fastest computer in Europe and the fourth fastest in the world. In the meantime, it is now in 40th place on the TOP500 list and has
39%
04.10.2018
of these steps are very simple.
For the test, we installed the package on a virtualized Windows 10 in a Windows 2016 domain. In previous tests, we set up trial versions on Windows Server 2008 R2 and Server 2012 R
39%
04.10.2018
] period, since we aren't faced with the deluge of data coming from the accelerator," said Bell. "During the previous upgrade cycle (2011-2012), we deployed OpenStack; it was a very natural point at which
39%
13.12.2018
and the Cloud): https://blog.codinghorror.com/the-infinite-space-between-words/
"Tuning Your Filesystem's Cache" by Federico Lucifredi, ADMIN
, issue 7, 2012, pg. 81, http://www
39%
30.11.2020
in Outlook Recycle Bin that were last changed more than 30 days ago: http://blog.icewolf.ch/archive/2012/07/15/ews-managed-api-demo-delete-items-in-recycle-bin-older.aspx
Getting started with managed EWS
39%
02.08.2022
1, 2012 R2 Datacenter, 2016 Datacenter, and 2019 Datacenter).
Essentially, Azure supports automatic guest system patching, on-demand patch assessment, and on-demand patch installation only for VMs
39%
03.12.2015
mechanisms, can be a relief. Since the release of Windows Server 2012 R2, Microsoft has offered a cloud service for BCM under the name of "Hyper-V Recovery Manager." The first version covered the enterprise
39%
18.02.2018
than a system with refrigeration units. Water cooling saves another 10 percent compared with air cooling by fans.
At its inauguration in 2012, SuperMUC clocked in at around 3PFLOPS and was once
39%
05.02.2019
against pass-the-hash attacks in Windows 10. For systems with Windows 7 or Windows Server 2012, you have no real defense against the attacks described above, only optimized procedures