search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(426)
Article
(92)
Blog post
(1)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
26
27
28
29
30
31
32
33
34
35
36
37
38
39
...
52
Next »
10%
Web applications with Julia
26.01.2025
Home
»
Archive
»
2025
»
Issue 85: Monit...
»
.0.0.1", PORT) do ws
08
for msg in ws 09 d = Meta.parse(JSON.parse(msg)["s"]) 10 @info d 11 @info typeof(d)
12
WebSockets.send(ws, """
You picked $d
10%
Business continuity for small to medium-sized enterprises
30.11.2025
Home
»
Archive
»
2012
»
Issue 08: FreeNAS
»
combinations are supported: ShadowProtect 4.0.1: Oracle VirtualBox 3.1.0--3.2.
6
ShadowProtect 4.0.5: Oracle VirtualBox 3.1.0--3.2.
12
ShadowProtect 4.1: Oracle VirtualBox 3.1.0--4.0.4 Shadow
10%
Performance Health Check
13.06.2022
Home
»
HPC
»
Articles
»
.69 17.26 67.7 IS (4 cores) 0.
6
2.16 8.2 LU (
6
cores) 5.13 41.8 MG (4 cores)
1.2
3.8 39.1 SP (4 cores
10%
Live migration of virtual machines with KVM
13.06.2016
Home
»
Archive
»
2016
»
Issue 33: IPv6...
»
(e.g., iSCSI, Fibre Channel), or you can stick with NFS. For example, NetApp Clustered ONTAP also offers support for pNFS, which newer Linux distributions such as Red Hat Enterprise Linux or CentOS
6
10%
SSH Administration – Windows in a Unix World
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
saved in /home/khess/.ssh/id_rsa.pub. 09 the key fingerprint is: 10
6
d:2c:04:dd:bf:b2:de:e1:fc:52:e9:7f:59:10:98:bb khess@windows 11 The key's randomart image is:
12
+--[ RSA 2048]----+ 13 | .. . o
10%
Introduction to behavior-driven monitoring
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
-resource browser simulator used for test scenarios involving HTTP. You will also find the Mechanize library [
6
], which contributes functions for automated interactions on websites. Additionally, thanks to the Ruby
10%
Overview of cloud platforms and appliances
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
Index for Various Providers Product Static IP Address (0.2) Software Appliances and Images Used (0.4) Web Storage (0.2) CDN (0.2) IPv
6
(0.2) Pay As You Go
10%
Planning Performance Without Running Binaries
02.02.2021
Home
»
Archive
»
2021
»
Issue 61: Secur...
»
bottlenecks, not absolute speedup numbers for the whole codebase. Second, given more resources, you will usually process more data or do more work. Gustafson's law [
6
] provides an alternative formulation
10%
Web Cryptography API
26.11.2013
Home
»
Articles
»
RawKey = "4ea1...b2bf"; 02 var encAlg = { 03 name : "AES-GCM", 04 params : { 05 iv : hex2bin("534aea17"), 06 additionalData: hex2bin("534aea17"), 07 tagLength: 128
08
} 09 }; 10 function encrypt
10%
Free backup tool for data centers
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
Password = "YdhKKoy2Huq1CVHwIR" 05 Pid Directory = "/var/run" 06 Query File = "/usr/lib/bacula/query.sql" 07 Working Directory = "/var/lib/bacula"
08
} 09 10 Fileset { 11 Name = "Full Set"
12
« Previous
1
...
26
27
28
29
30
31
32
33
34
35
36
37
38
39
...
52
Next »