18%
07.10.2014
from systems such as the IIS, Microsoft Exchange ActiveSync, Exchange Web Services (EWS), or Outlook Web Access (OWA).
Installation under .NET
.NET Framework 4.x and Log Parser 2.2 [2] form the basis
18%
14.08.2017
such as containers. In native cloud environments, Prometheus [3], with its time series database approach, has therefore blossomed into an indispensable tool. The software is related to the Kubernetes [4] container
18%
13.12.2018
# and network has converged
traceroute -In 10.4.1.25
1 10.3.1.22 # backup VPN
# router site 3
2 172.16.1.7 # backup VPN
# router site 4
3 10.4.1.25
LAN Failure
18%
29.09.2020
at the blog [3] reveals that new versions of Cockpit are released approximately every two weeks.
In an article from 2015 [4], ADMIN
looked into the topic of managing Linux servers with Cockpit; since then
18%
04.04.2023
(NIST) National Vulnerability [2] or the Aqua Vulnerability [3] database.
Figure 1: An image scan with Trivy generates a long list of vulnerabilities
18%
04.08.2020
in the standard Python built-ins [2] and in the NumPy library [3].
Figure 1: IPython session comparing two implementations of a round routine.
Unless you
18%
04.08.2020
], LANDESK [3], Google's G Suite Mobile Management [4], and bitFit [5].
Herd Immunity
One of the most impressive aspects of Netflix's Stethoscope is that, when it displays its findings, it generously
18%
12.09.2013
-passphrase
Several parameters in this file define the repository layout [2] [3], as follows:
Origin: An optional field that describes the origin of the repository. You can select a free line of text.
Label
18%
14.03.2013
details as well [3]. The files in the Linux /proc directory also have a pleasingly hackable penchant for being directly readable as plain text, as opposed to more binary-centric proc implementations
18%
18.07.2013
Lustre on top of ZFS [3] and reaching about 850GBps. Marc talked about moving data from older systems to Sequoia and some of the issues the team faced (it wasn't easy). His talk inspired me to examine