17%
01.06.2024
msstore
Search repo(s) for matching packages by nameLimit search to a particular package source
list
ls
winget listwinget list - n 12winget list --upgrade-availablewinget list
17%
12.11.2013
community to continue development of an independent fork named Bareos.
The first stable release was Bareos 12.4 in April 2013 (the version number stands for the year and the quarter of the feature freeze
17%
21.08.2014
. For example, the nodes could search for updates and install them.
Serf is written in Go and licensed under the Mozilla Public License 2.0. Source code is available on GitHub [12], with prebuilt packages
17%
04.04.2023
get po -l app=spire-server -o jsonpath="{.items[0].metadata.name}")
kubectl -n spire logs $SPIRE_SERVER_POD | grep -B1 attestation
You will see that the SPIRE Server issued an SVID to the node agent
17%
05.08.2024
ENTRYPOINT ["gcloud","beta","emulators","pubsub","start","--project=demo"]
CMD ["--host-port=0.0.0.0:8085"]
Now, create the script in Listing 2 for the Pub/Sub service to create a topic
17%
14.03.2013
modeling, allows for more powerful mapping, and alleviates design limitations through more natural representation.
Apache Cassandra v1.2 is released under the Apache License v2.0. Cassandra releases include
17%
27.09.2024
query large amounts of data on distributed systems. CouchDB has been an Apache project since 2008. Version 1.0 in 2010 has evolved into version 3.3 today.
"Couch" was originally an acronym for "cluster
17%
11.04.2016
-enterprise-3.8.1-ubuntu-14.04-amd64/packages/ubuntu-14.04-amd64
sudo dpkg -i pe-cloud-provisioner-libs_0.3.2-1puppet1_amd64.deb
sudo dpkg -i pe-cloud-provisioner_1.2.0-1puppet1_all.deb
vSphere Setup
After
17%
18.03.2013
is a classic bug in a web application: an SQL injection vulnerability. SQL injection, which has been known for around 12 years, is still one of the hacker’s most popular tools.
This article presents real
17%
14.03.2013
is a classic bug in a web application: an SQL injection vulnerability. SQL injection, which has been known for around 12 years, is still one of the hacker's most popular tools.
This article presents real