search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
three medicine https://simplemedrx.top
?
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(42)
Article
(5)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
2
3
4
5
Next »
81%
Linux Storage Stack
11.02.2016
Home
»
Archive
»
2016
»
Issue 31: Tunin...
»
are implemented. They may operate with conventional devices, but they also perform additional functions, such as layering logical devices on
top
of each other (i.e., stacked devices). The Logical Volume Manager
81%
From Out of the Blue
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
come about? DR: I follow LKML (the Linux kernel mailing list [7]), so I saw Nelson Elhage's original report for the primary issue (the failure to revert an address limit override in an OOPSed
thread
81%
High-Performance Python 4
14.10.2019
Home
»
HPC
»
Articles
»
such as InfiniBand and NVLink. Many tools can be built on
top
of UCX taking advantage of the commonality of UCX as well as the performance and portability. For example, UCX is currently a framework used within
81%
Distributed denial of service attacks from and against the cloud
14.11.2013
Home
»
Archive
»
2013
»
Issue 17: Cloud...
»
the repertoire of DNA reflexive attacks. Some attackers use their own
top
-level domains, which serve the sole purpose of performing sophisticated DNS attacks. These domains give the perpetrators the ability
81%
Interview with Cloud Foundry CEO Sam Ramji
03.12.2015
Home
»
Archive
»
2015
»
Issue 30: OpenD...
»
Stack or VMware or bare metal provisioning, "cloud" really points at "elastic capability for infrastructure." So, on
top
of the elastic capability for infrastructure, now you need something that can be deployed
80%
Denial of Service in the Cloud
12.11.2013
Home
»
Articles
»
. However, these examples do not exhaust the repertoire of DNA reflexive attacks. Some attackers use their own
top
-level domains, which serve the sole purpose of performing sophisticated DNS attacks
80%
What's new in Small Business Server 2011
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
for the long overdue integration with SQL Server. Storage groups no longer exist, and the
top
level is represented by mailbox stores. Each mailbox store has its own set of transaction protocols; in SBS 2008
80%
Small-board computers
17.02.2015
Home
»
Archive
»
2015
»
Issue 25: Safe...
»
.041GFLOPS for double-precision. This level of performance won't get a cluster of Raspberry Pi's on the
TOP
500 any time soon, but that's not the real point of the RPi. The point is to get fully featured
80%
A DIY HTML Engine
14.03.2018
Home
»
Archive
»
2018
»
Issue 44: Cloud...
»
: < contact > to create a new permanent link section at the
top
of the page. Listing 3: Contact Form
https://formspree.io/abc@gmail.com" method="POST">
80%
Protecting your web application infrastructure with the Nginx Naxsi firewall
18.07.2013
Home
»
Archive
»
2013
»
Issue 15: What’...
»
resource requirements. Although Apache is still king of the hill, approximately 30 percent of the
top
10,000 websites already benefit from Nginx [2] (Figure 1
« Previous
1
2
3
4
5
Next »