46%
14.04.2021
A long time ago, I was a system administrator for a couple of HPC systems, but I also inherited two HP (Hewlett-Packard) N-class servers (mainframes). Along with two WORM storage units, these were
46%
05.02.2019
_name IN ('version','version_comment');
+-----------------+----------------+
| Variable_name | Value |
+-----------------+----------------+
| version | 10.3.9-MariaDB |
| version_comment | Maria ... What lacked maturity in MariaDB 10.2 has now been sorted out in version 10.3. We look at the benefits you can reap now.
46%
22.08.2011
is very high. A hacker can recover dictionary-based passwords in minutes, whereas a brute force attack can take days.
Brute force is a single-character-at-a-time attack on a password file. With a powerful
46%
19.11.2014
at the swap usage. Although this method works reasonably well, I prefer to use vmstat [2] (virtual memory statistics), because I can tell how actively the node is swapping – a little or a lot? Vmstat
46%
11.02.2016
in a number of editions. The free UCS Core Edition is accompanied by three subscription versions (Base, Standard, and Premium), for which the vendor asks for between $349 and $2,049 per year [9]. The vendor has
46%
25.09.2023
represents hundreds of terawatt hours and, potentially, 90 million tons of CO2 released into the atmosphere [1].
Although data center efficiency and sustainability have advanced in leaps and bounds over
46%
05.10.2018
/etc/profile.d/rvm.sh
$ rvm reload
$ rvm requirements run
$ rvm install 2.5 # This may take a while
$ rvm list
$ rvm use 2.5 --default
$ ruby --version
$ gem update # Errors not related to kubeclient
46%
03.04.2024
).
Figure 2: Whereas K3s and MicroK8s use Hostpath as the storage driver with just one container, MicroShift relies on TopoLVM, which grabs eight containers.
The installation on RHEL 9 relies on an RPM
46%
09.08.2015
release to the encryption toolkit to address a "certificate forgery" issue. The problem affects OpenSSL versions 1.0.2c, 1.0.2b, 1.0.1n, and 1.0.1o. According to the security advisory (CVE-2015
46%
13.06.2016
has successfully found 9 of 10 test 'victims' in the office."
The algorithm powering the facial recognition is developed by Russia-based N-Tech.Lab, which beat Google's face recognition software