search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%220mb%3 08 Llorente 08
?
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(186)
Article
(33)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
2
3
4
5
6
7
8
9
10
...
22
Next »
19%
Red Hat PaaS hyperconverged storage
22.12.2017
Home
»
Archive
»
2017
»
Issue 42: Secur...
»
with Gluster containers … Figure 2: … or an external storage cluster, in which the individual Gluster nodes run [
3
]. A new service in Gluster
3.1.3
19%
Policy rulesets in cloud-native environments
06.10.2022
Home
»
Archive
»
2022
»
Issue 71: Kuber...
»
find ready-made policy bundles online for many use cases, and they are likely to contain a useful, predefined set of rules. A freely accessible Playground [2] and a free Styra Academy [
3
] can help you
19%
Environment Modules
23.02.2012
Home
»
HPC
»
Articles
»
------------------------------------------- /opt/apps/intel11_1/modulefiles ------------------------------------------- fftw
3/3
.2.2 gotoblas2/1.
08
hdf5/1.8.4 mkl/10.2.4.032 mvapich2/1.4 netcdf/4.0.1 openmpi/1
19%
Visualizing time series data
21.08.2014
Home
»
Archive
»
2014
»
Issue 22: OpenS...
»
application then grabs the data from this database and creates charts. The client can be programmed by the user or it can come as a prepared daemon (e.g., collectd [
3
]). If you like to measure your own ...
22
19%
Cross-Vendor IPsec
25.10.2011
Home
»
Articles
»
-algorithm sha1; 07 encryption-algorithm
3
des-cbc;
08
} 09 policy test123 { 10 mode main; 11 proposals Phase1-
3
des-sha; 12 pre-shared-key ascii-text "$9$dQVgJiHmTF/.PO1Ehrlgoa
19%
SSL/TLS best practices for websites
07.10.2014
Home
»
Archive
»
2014
»
Issue 23: 10 Ti...
»
-RSA-AES256-GCM-SHA384 05 DHE-RSA-AES128-GCM-SHA256 06 DHE-RSA-AES256-GCM-SHA384 07 ECDHE-ECDSA-AES128-SHA
08
ECDHE-ECDSA-AES256-SHA 09 ECDHE-ECDSA-DES-CBC
3
-SHA 10 ECDHE-RSA-AES128-SHA 11 ECDHE-RSA-AES256-SHA
19%
HDF5 with Python and Fortran
21.03.2017
Home
»
HPC
»
Articles
»
these concepts. Listing 1: Starting Out with h5py 01 #!/home/laytonjb/anaconda2/bin/python 02 03 import h5py 04 import numpy as np 05 06 # =================== 07 # Main Python section
08
19%
Roll out hybrid clouds with Ansible automation
14.03.2018
Home
»
Archive
»
2018
»
Issue 44: Cloud...
»
is like adding a virtual cable between your two VPCs (Figure
3
). You need to accept this peering in a separate step. So that the VMs can find their way out of the outer VPC later on, you now need to create
19%
Thread processing in Python
02.06.2020
Home
»
Archive
»
2020
»
Issue 57: Artif...
»
around the GIL is to run computationally intensive code outside of Python with tools such as Cython [1] and ctypes [2]. You can even use F2PY [
3
] with compiled C functions. All of the previously mentioned
19%
Web Cryptography API
26.11.2013
Home
»
Articles
»
ability of web browsers to encrypt and decrypt application data using JavaScript, is currently under review by the World Wide Web consortium (W
3
C) as a draft. This promising technology reaches well beyond
« Previous
1
2
3
4
5
6
7
8
9
10
...
22
Next »