17%
07.01.2024
mkfs.bfs mkfs.cramfs mkfs.ext2 mkfs.ext3 mkfs.ext4
mkfs.fat mkfs.minix mkfs.msdos mkfs.ntfs mkfs.vfat
These are the filesystems I can use with the mkfs
command on this system. If you want to build other
17%
20.06.2022
Installing the Ops Agent
:> agents_to_install.csv && echo '"projects/playground-gs/zones/europe-west3-c/instances/test-vm1","[{""type"":""ops-agent""}]"' > agents_to_install.csv && curl -sSO https://dl
17%
30.05.2021
is constantly being developed by an active community and Chef itself. The portfolio now includes 4,000 freely usable cookbooks for the configuration of software and several hundred plugins and additional tools
17%
08.10.2015
% parallelizable (20% is serial, primarily because of I/O). For one process, the wall clock time is assumed to be 1,000 seconds, which means that 200 seconds is the serial portion of the application. By varying
17%
08.10.2015
addresses, you can also store the domain lists in a table and even use wildcards. Listing 3 (domains) demonstrates this for example.org
, example.net
, example.com
, and all their subdomains. Because you want
17%
15.08.2016
(FC SAN)/Internet Small Computer System Interface (iSCSI). This storage is then provided to the application servers, such as Hyper-V or SQL Server, over the network. SMB version 3 is used
17%
05.08.2024
so, for a combination of open source software with extension modules and commercial support.
Starting Point
The backup software originally used was IBM's Tivoli Storage Manager [3]. However, a review
17%
30.11.2025
also frequently provides the underpinnings for a virtualization cluster that runs multiple guests in a high-availability environment, thanks to Open Source tools such as Heartbeat [2] and Pacemaker [3
17%
10.04.2015
01 auto br0
02 iface br0
03 bridge-ports swp1 swp2 swp3 swp4 swp5
04 bridge-stp on
Because the list would be pretty long for 52 ports, you can also do the following specify
17%
02.03.2012
, and because of its diminutive code base, exceptionally secure. How secure? You might well ask Well, how does a US$ 1,000 reward sound if you discover a security hole? You have to admit that such an offer