16%
25.03.2021
-performance computing (HPC) system, and the readings are resource aspects of the system (e.g., CPU, memory, network and storage usage, etc.). Here, the telemetry is used to help the user understand what their application
16%
03.12.2015
introduces you to the structure based on a sample scenario.
Google and Facebook provide examples of the need to manage data streams on networks in a targeted way. The legacy network architecture was unable
16%
05.12.2016
, proprietary alternative is also available in the form of Vivaldi. Even Google was able to gain a foothold on Linux with its Chrome browser and its free counterpart Chromium.
If you prefer a text-based browser
16%
02.03.2018
example is the seccomp function, which is part of the Linux kernel and was originally developed for Google Chrome. Seccomp is designed to limit the permitted system calls (syscalls) to the absolute minimum
16%
26.01.2025
to volunteer.
While attending SC24, I learned that SCinet uses 1MW/day. After a little Google search, I discoverd that's enough power for 1,000 American homes. This number led me to think about liquid
16%
27.09.2024
. Connectors are currently available for Amazon Web Services, Microsoft Azure, and the Google Cloud Platform. After provisioning the system, you will automatically have access to all other Insights services
16%
07.04.2022
not manage some services (e.g., the print server) with its own GUI but simply redirects you to the UI of the respective service (e.g., CUPS).
Figure 1: Clear
16%
07.04.2022
server in Azure, Amazon Elastic Compute Cloud (AWS EC2), or Google Compute, you have to pay attention to the correct firewall settings when creating the VM. In addition to SSH port 22, you need to allow
16%
22.08.2011
cloud to cloud. Differences exist not only in the naming of logically equivalent states and operations, but also in the quantity and sequence of the states (Figure 3). Because of this, Deltacloud provides
16%
04.10.2018
. An incorrect configuration of security settings can occur at all levels of the application stack (i.e., on web servers, application servers, and in databases and the web applications that use them). To detect