search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(519)
Article
(146)
News
(12)
Blog post
(1)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
24
25
26
27
28
29
30
31
32
33
34
35
36
37
...
68
Next »
9%
Parallel Programming with OpenCL
04.11.2011
Home
»
HPC
»
Articles
»
convolutionSum =
0.0
f; 05 06 // Iterate over convolution kernel 07 for(size_t ky =
0
; ky < kernel.height; ++ky) 08 { 09 for(size_t kx =
0
; kx < kernel.width; ++kx) 10 11 {
12
9%
RESTful APIs in practice
09.10.2017
Home
»
Archive
»
2017
»
Issue 41: Kuber...
»
. 123197
12
Dr. House Solutions Gmbh | Mon,
12
.Aug 2013 | -1753.2 | rent July 2012 13 Airfreu Ag | Tue, 13.Aug 2013 | 2300.
0
| salary 14 Christoffel Mission to the Blind | Wed, 14.Aug 2013 | -30.
0
| Elv14ß
9%
Retrieving Windows performance data in PowerShell
10.04.2015
Home
»
Archive
»
2015
»
Issue 26: OpenS...
»
-WMIObject Win32_OperatingSystem | fl Name, BuildNumber, Version Name: Microsoft Windows 8.1 Enterprise|C:\Windows|\Device\Harddisk
0
\Partition4 BuildNumber: 9600 Version: 6.3.9600 The command
9%
New versions of the Endian and Sophos UTM solutions
20.05.2014
Home
»
Archive
»
2014
»
Issue 20: IPv6...
»
available in both free and commercial versions. According to the manufacturer, more than 4,000 customers deploy Endian Firewall Enterprise, and more than
1.2
million users have downloaded the community
9%
Detecting malware with Yara
09.10.2017
Home
»
Archive
»
2017
»
Issue 41: Kuber...
»
= "A pdf file that contains a bad link" 10 11 strings:
12
$pdf_magic = {68 47 77 22} 13 $s_anchor_tag = "
0 and (#s
9%
Tuning loops – from loop unrolling to Duff's device
28.07.2025
Home
»
Archive
»
2025
»
Issue 88: 5 Net...
»
on the programming model and compiler in use, these optimizations are so well understood as to carry their own names. Loopy David Spuler's recent works [
1][2
] feature the taxonomy of loop manipulation strategies
9%
Managing Linux systems with Spacewalk
14.11.2013
Home
»
Archive
»
2013
»
Issue 17: Cloud...
»
use strict; 04 use Exporter; 05 use vars qw($VERSION @ISA @EXPORT @EXPORT_OK %EXPORT_TAGS); 06 07 $VERSION = 1.
0
; 08 @ISA = qw(Exporter); 09 @EXPORT = (); 10 @EXPORT_OK = qw
9%
Nagios alerts implemented via VoIP
14.03.2013
Home
»
Archive
»
2013
»
Issue 13: IPv6...
»
http://www.pjsip.org/release/2.
0
./pjproject-2.
0
.1.tar.bz2 Next, go to the directory where you unpacked the tarred and zipped file and type: ./configure make dep make You will now have a file starting
9%
Tuning I/O Patterns in Fortran 90
04.12.2013
Home
»
HPC
»
Articles
»
3 type rec 4 integer :: x, y, z 5 real :: value 6 end type rec 7 8 integer :: counter 9 integer :: counter_limit 10 integer :: ierr 11
12
type (rec) :: my
9%
Malware Analysis
11.06.2014
Home
»
Archive
»
2014
»
Issue 21: Manag...
»
at the bottom of the window, ranges from
0
(less risky) to 100 (more risky). Because these two processes started after the malware installed, they are likely bad. When I compared the Start Time of svchost
« Previous
1
...
24
25
26
27
28
29
30
31
32
33
34
35
36
37
...
68
Next »