25%
08.10.2015
market dominance, the company needs to build a case for the presence of full-featured laptop and desktop PCs, rather than lighter and simpler tablet systems.
The new processors are designed to work
25%
14.03.2018
on the monitoring system is green, or not, in which case the entry is red, and an escalation spiral is set in motion (Figure 1). If necessary, admins are dragged from their beds
25%
09.04.2019
on the other side. In most cases, a WAP (Web Application Proxy) server comes into play in the perimeter network (DMZ); it knows the ADFS server in the neighboring Active Directory and controls access from
25%
20.03.2014
.
The most important data structure in NumPy is the N
-dimensional array, ndarray. In a one-dimensional case, ndarrays are vectors. Unlike Python lists, the size of NumPy arrays is immutable; its elements
25%
11.10.2016
, thus making it even more difficult for users to notice a difference.
The document contains a macro that enables malicious code downloads and thus acts as a downloader. In this case, the malicious code
25%
12.09.2013
some tips, at least for the major topics of everyday admin life, so you know what to do – just in case.
How Healthy Is Your Cluster?
From an administrative point of view, it is quite interesting
25%
04.12.2024
extensive as-code scenarios, as well as for cases in which you roll out and configure other applications. Because a huge amount of code is involved, I can only describe fragments of it in detail here
25%
11.06.2013
plans has something to do with the use of indexes. People often have the idea that an index will accelerate execution as a matter of principle. But this is only half the truth.
In some cases, an index
25%
07.10.2014
to another; a careful evaluation of the options in advance is therefore necessary in any case.
The Typical Setup
The issue of resources is of overriding importance for both Puppet and Chef. A typical Puppet
25%
04.04.2023
will want to focus on the critical vulnerabilities in most cases by defining limits for the scanning process:
trivy image --severity CRITICAL nginx
In the output, you can see two critical vulnerabilities