search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(237)
Article
(52)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
16
17
18
19
20
21
22
23
24
25
26
27
28
29
Next »
17%
The AWS CDK for software-defined deployments
05.02.2019
Home
»
Archive
»
2019
»
Issue 49: Anato...
»
": "node bin/hello-cdk.js", 03 "context": { 04 "cidr_by_env": { 05 "dev": "10.100.
0.0
/16", 06 "qa": "10.200.
0.0
/16", 07 "prod": "10.300.
0.0
/16"
08
}, 09 "max_azs": { 10
17%
Lean on Logwatch
17.02.2015
Home
»
Archive
»
2015
»
Issue 25: Safe...
»
NEW packages will be installed: libdate-manip-perl libyaml-syck-perl logwatch As a result, about
12
.5
MB
of new software is installed. Logwatch gets configuration details several ways: from script
17%
Matlab-like tools for high-performance computing
16.05.2013
Home
»
Archive
»
2013
»
Issue 14: Samba 4
»
,1000); 06 07 // Set host data on the Device (GPU)
08
dA = gpuSetData(A); 09 dC = gpuSetData(C); 10 11 d1 = gpuMult(A,B);
12
d2 = gpuMult(dA,dC); 13 d3 = gpuMult(d1,d2); 14 result = gpuGetData(d3); // Get
17%
MySQL is gearing up with its own high-availability Group Replication solution
17.06.2017
Home
»
Archive
»
2017
»
Issue 39: Conta...
»
_schema.events_statements_summary_global_by_event_name WHERE event_name LIKE "%/savepoint"; +------------+ | COUNT_STAR | +------------+ | 1 | +------------+ 1 row in set (
0
.00 sec) Hands On The following sections demonstrate the installation
17%
Web applications with Julia
26.01.2025
Home
»
Archive
»
2025
»
Issue 85: Monit...
»
startserver() 05 WebSockets.listen("127.
0.0
.1", PORT) do ws 06 for msg in ws 07 d = Meta.parse(JSON.parse(msg)["s"])
08
WebSockets.send(ws, """
You picked $d
17%
Graph database Neo4j discovers fake reviews on Amazon
04.08.2020
Home
»
Archive
»
2020
»
Issue 58: Graph...
»
similarity value of 1.
0
to the two rascals. Of course, this is not yet hard evidence of unfair practices, but the result at least shows where you could drill down further to reveal more evidence
17%
Security data analytics and visualization with R
05.12.2014
Home
»
Archive
»
2014
»
Issue 24: Visua...
»
(plyr) 06 library(ggplot2) 07
08
setwd("~/R/RFI") 09 rfi <- read.csv("rfi-extract-July2011.log",header=TRUE, sep=",") 10 11 ## read in data to frame
12
data <- data.table(rfi) 13 ct <- count
17%
Protecting your web application infrastructure with the Nginx Naxsi firewall
18.07.2013
Home
»
Archive
»
2013
»
Issue 15: What’...
»
backend3.example.com server; 05 backend4.example.com server down; 06 backend5.example.com backup server; 07 }
08
09 upstream fallback { 10 fallback1.example.com server: 8081; 11 }
12
13 14 server { 15 % 16
17%
Linux Essentials for Windows Admins – Part 2
06.08.2012
Home
»
Articles
»
> Contacts 07/28/2012 02:38 PM
Desktop 07/27/2010
08
:15 AM
Diskeeper 07/11/2012 03:17 PM
Documents 07/29/2012 03:51 PM
Downloads 07
17%
Trivy security scanner
04.04.2023
Home
»
Archive
»
2023
»
Issue 74: The F...
»
_type = "simple-zonal" 03 } 04 provider "google" { 05 ... 06 } 07 data "google_client_config" "default" {}
08
provider "kubernetes" { 09 ... 10 } 11 /*******************************************
12
« Previous
1
...
16
17
18
19
20
21
22
23
24
25
26
27
28
29
Next »