search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%6mb"2010 Llorente
?
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(243)
Article
(75)
News
(5)
Blog post
(2)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
24
25
26
27
28
29
30
31
32
33
Next »
16%
Comparing Ceph and GlusterFS
21.04.2015
Home
»
Archive
»
2014
»
Issue 23: 10 Ti...
»
filesystems in userspace (FUSEs) have enjoyed a fair amount of popularity [
6
]). GlusterFS also used this approach, which offers several advantages: Development is not subject to the strict regulations
16%
Desktop Supercomputers: Past, Present, and Future
17.03.2021
Home
»
HPC
»
Articles
»
” on a single special motherboard. Each node was a Transmeta Efficeon processor connected to the other nodes over Gigabit Ethernet (GigE). Each node also had 512
MB
of memory, and the system had a 160GB hard drive
16%
ZAP provides automated security tests in continuous integration pipelines
23.08.2017
Home
»
Archive
»
2017
»
Issue 41: Kuber...
»
of the stack in the Application Layer (OSI model Layer 7) [
6
]. Although many fantastic network security tools exist that will probe every nook and cranny of a network stack, ZAP specializes in the application
16%
Transcoding optical media in Linux
05.12.2019
Home
»
Archive
»
2019
»
Issue 54: NVMe...
»
. Whereas video CDs usually have a capacity of around 700
MB
, video DVDs that follow the DVD-18 standard can store around 17GB. The significantly higher storage capacity not only makes it possible to offer
16%
New versions of the Endian and Sophos UTM solutions
20.05.2014
Home
»
Archive
»
2014
»
Issue 20: IPv6...
»
or a vulnerability in the hypervisor, the virtual machines and, ultimately, the firewall can be hijacked by an attacker. Most hypervisors have already been affected by such vulnerabilities [5] [
6
]. A report by the IBM
16%
Designing a Secure Active Directory
26.03.2025
Home
»
Archive
»
2025
»
Issue 86: Data...
»
(PAM) trust [
6
] to the Red Forest. You might also want to consider the use of smart cards for Red Forest logins and use shadow principals to assign principals from the Red Forest permissions in a Golden
16%
How to configure and use jailed processes in FreeBSD
14.03.2013
Home
»
Archive
»
2013
»
Issue 13: IPv6...
»
are available to let administrators manage jails on the host system [
6
]. Here's a brief look: jail [-i] [-l -u
| -U
]
: Starts a jail
15%
Free Enterprise Backup with Bareos
12.11.2013
Home
»
Articles
»
director ... Terminated Jobs: JobId Level Files Bytes Status Finished Name ===================================================== 1 Full 135
6
.679 M OK 18-Jul-13 16:00 BackupClient1 2 Incr 0 0 OK
15%
Profiling Is the Key to Survival
19.12.2012
Home
»
HPC
»
Articles
»
has the following specifications: 4 cores at 3.8GHz (turbo to 4.2GHz) 4
MB
L2 cache 384 Radeon cores 800MHz GPU clock speed DDR3 1866MHz memory 100W Putting both the CPU
15%
Many Clouds, One API
22.08.2011
Home
»
Articles
»
machines with a fixed 1GB of RAM, whereas another could allow the user to set up memory of between 1 and 8GB in increments of 512
MB
. The Deltacloud API bundles all these different possibilities
« Previous
1
...
24
25
26
27
28
29
30
31
32
33
Next »