10%
09.04.2019
a minimum viable product (MVP, i.e., a slimmed down prototype) that will consist of a FaaS-like build engine that Jenkins X could use. In this way, the MVP would bring together existing projects
10%
26.01.2025
22 ztable = join(ztable)
23 p = plot([f1 f2]; xrange=(0, 1), lc=[lc1 lc2], lw=2, xlabel="x", ylabel="y", label=["cos($c x)" "$(t)tan(x)"])
24 show(io, MIME"image/png"(), p)
25
10%
05.02.2019
or pieced together in scripts.
The idea that automation could play a role in the CI/CD context did not develop until the advent of Docker and the like, when containers became the focus of interest ... Chef, one of the oldest automation solutions, seeks to become a universal administration robot for cloud environments with new version 2.0. ... Chef Automate 2.0
10%
07.06.2019
Kubernetes [1] is king of the hill in the orchestration universe. Invented by Google and now under the auspices of the Linux Foundation, Kubernetes has not only blossomed quickly but has led
10%
03.02.2022
to this drive need to enter the password in Explorer or use the Unlock-Bitlocker cmdlet with the password. Again, the assumption is that you stored it in the $PassW variable:
Unlock-Bitlocker -MountPoint "E
10%
07.10.2014
/test
[zk: localhost:2181(CONNECTED) 11] get /test
HelloWorld!
cZxid = 0xa1f54
ctime = Sun Jul 20 15:22:57 CEST 2014
mZxid = 0xa1f54
mtime = Sun Jul 20 15:22:57 CEST 2014
pZxid = 0xa1f54
cversion = 0
10%
11.06.2014
, Microsoft no longer uses the term CIFS, because the original extensions were developed for SMB 1.0, and they no longer play a role in SMB 2.0.
SMB 2.1 mainly offers performance improvements, especially
10%
28.11.2021
/2020/11/05/tracker-3-0-where-do-we-go-from-here/
SPARQL 1.1 Overview: https://www.w3.org/TR/sparql11-overview/
Tracker CLI documentation: https
10%
30.11.2025
, Windows provides a corresponding NetShell helper to let you control the service via NetShell.
A Question of Context
NetShell [1] can be used in two ways: On the one hand, you can call each Net
10%
03.02.2022
. Encryption by means of a certificate or multifactor access control (e.g., FIDO2 in addition to the password) is more useful, preventing data leaks even if the stick and the password fall into the hands