search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(352)
Article
(100)
News
(19)
Blog post
(2)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
25
26
27
28
29
30
31
32
33
34
35
36
37
38
...
48
Next »
31%
Kernel and driver development for the Linux kernel
07.10.2014
Home
»
Archive
»
2014
»
Issue 23: 10 Ti...
»
proc_create_data: Instead of S_IRUGO, you need S_IRUGO | S_IWUGO. Finally, four lines need to be added to the program header: #include
static char kernel_buffer[
256
]; #define TEXT
31%
Synchronize passwords in KeePass
22.05.2023
Home
»
Archive
»
2023
»
Issue 75: Teamwork
»
the database to store your credentials on multiple devices. The associated file is only a few kilobytes in size, even if it contains many entries, and the content is securely encrypted by
256
-bit AES. Kee
31%
When are Kubernetes and containers not a sensible solution?
28.11.2022
Home
»
Archive
»
2022
»
Issue 72: OpenS...
»
256
checksums of the individual files match). This way of tracking whether any local changes have been made to the package content is both excellent and compliant. The situation is quite different
31%
Software instead of appliances: load balancers compared
25.03.2021
Home
»
Archive
»
2021
»
Issue 62: Lean...
»
by designing for hardware redundancy. However, now that the infamous half-height pizza boxes come with
256
GB of RAM and multicore CPUs, the financial outlay is manageable. Moreover, the software load balancers
31%
How persistent memory will change computing
03.12.2015
Home
»
Archive
»
2015
»
Issue 30: OpenD...
»
than DRAM. At the extreme, you can pretty much buy systems with 1-2TB of memory, but you probably don't buy too many of them because of cost. Typical compute nodes are in the 64-
256
GB range. Persistent
31%
Safely integrating and running Office 365
11.02.2016
Home
»
Archive
»
2016
»
Issue 31: Tunin...
»
a few tools in this area can help with encrypting data. For example, you can use the Boxcryptor tool [5] to encrypt data using AES-
256
and RSA. The data is encrypted with a password and a keyfile
31%
Legally compliant blockchain archiving
05.12.2019
Home
»
Archive
»
2019
»
Issue 54: NVMe...
»
of a raw data hash (SHA
256
) and a UUID (per document) and is valid for all processes in the system (Figure 2). Thus, it is possible at any time to restore individual data records or even the entire database
31%
Cloud protection with Windows Azure Backup
20.03.2014
Home
»
Archive
»
2014
»
Issue 19: Perim...
»
change the settings for the backup at any time, of course. You can also use Properties/Bandwidth Throttling to limit the bandwidth available to the online backup. You can enter data from
256
Kbps to 1Gbps
31%
Registry for Docker images
01.08.2019
Home
»
Archive
»
2019
»
Issue 52: Stop...
»
push remote.repository.com:5000/alpine:latest The push refers to repository [remote.repository.com:5000/alpine] 73046094a9b8: Pushed latest: digest: sha
256
:0873c923e00e0fd2ba78041bfb64a105e1ecb7678916d1f
31%
Efficiently planning and expanding the capacities of a cloud
02.03.2018
Home
»
Archive
»
2018
»
Issue 44: Cloud...
»
. Systems like this are usually equipped with
256
or 512GB of RAM. As a result of overcommitting CPU resources, a total of 56 virtual CPU cores are available, of which the provider normally passes 50
« Previous
1
...
25
26
27
28
29
30
31
32
33
34
35
36
37
38
...
48
Next »