13%
10.04.2015
, but the backup mechanism always uses encryption, and the Hub handles key management. Backups can be saved in the Amazon S3 cloud service and are always available for download via the GeoIP tag to the nearest data
13%
09.06.2018
(handshake, alert, CCS, or application data) (Figure 3). After symmetric keys are programmed, inline TLS functionality is enabled; henceforth, the TLS layer bypasses all crypto operations, and plain text
13%
08.07.2018
using GNU’s autoconfigure before:
./configure --with-ssh --without-rsh
make
make install
These three lines put the binaries into /usr/local/
, which is fine for testing purposes. For production work, I
13%
03.04.2024
, as far as managing it goes, including:
Backing up and restoring to AWS Simple Storage Service (S3) or an S3-compatible endpoint
Managing page and object caches
Generating SFTP users
Creating
12%
21.08.2014
http://www.mathworks.com/products/statistics/?s_cid=sol_des_sub2_relprod3_statistics_toolbox
Data Acquisition
Connect to data acquisition cards, devices, and modules
http ... 22
12%
11.10.2016
values for the CPU, hard disks, and load follow:
riemann-health -h -e -u 0.2 -r 0.5 -d 0.2 -s 0.3 -o l &
Figure 1: The -help parameter
12%
17.06.2017
Software services packaged as containers finally reached the remotest corners of IT about three years ago. Docker [1], rkt [2], LXC [3], and the like see themselves confronted with technologies
12%
02.02.2021
. One well-known example comes from the field of networks, when securing a website with an application and database. A buffer zone, known as the demilitarized zone (DMZ) [3], has long been established
12%
22.02.2017
, 6 ) / ( 4, 6 ) }
DATA {
1, 2, 3, 4, 5, 6,
7, 8, 9, 10, 11, 12,
13, 14, 15, 16, 17, 18,
19, 20, 21, 22, 23, 24
}
}
}
}
HDF5 has many ways to represent the same datatype
12%
18.02.2018
. The required modifications are explained in the Huginn wiki [3].
The software is based on Ruby on Rails [4] and therefore requires an installed Ruby environment; in fact, it needs version 2.2 or 2.3