search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(301)
Article
(39)
Blog post
(1)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
26
27
28
29
30
31
32
33
34
35
Next »
6%
VM and cloud management with openQRM
03.12.2015
Home
»
Archive
»
2015
»
Issue 30: OpenD...
»
created in this way: /usr/share/openqrm/bin/openqrm state list 5.2.3.before-update-05-06-15_
09
.14.20 Test-State-Backup-05-24-15_13.
09
.05 To restore the system configuration from the Test-State-Backup-05-24-15_13.
09
6%
ASP.NET web development framework
30.11.2020
Home
»
Archive
»
2020
»
Issue 60: Secur...
»
Options.ListenAnyIP(4711, 08 listenOptions => {
09
listenOptions.UseHttps("cert.pfx", "
"); 10 } 11 );
12
}) 13 .UseStaticWebAssets() 14 .Use
6%
Relational databases as containers
17.06.2017
Home
»
Archive
»
2017
»
Issue 39: Conta...
»
SQL [
6
], MariaDB [7], and PostgreSQL [8]. Entry-Level Relational Searching the web for the keyword "database" shows various techniques, implementations, approaches, and software variants. In this article
6%
Live migration of virtual machines with KVM
13.06.2016
Home
»
Archive
»
2016
»
Issue 33: IPv6...
»
(e.g., iSCSI, Fibre Channel), or you can stick with NFS. For example, NetApp Clustered ONTAP also offers support for pNFS, which newer Linux distributions such as Red Hat Enterprise Linux or CentOS
6
6%
Attacks on HTTPS Connections
13.06.2016
Home
»
Archive
»
2016
»
Issue 33: IPv6...
»
supported by Chrome since Chromium
12
and Firefox from version 32. Safari and Internet Explorer have not previously supported pinning. Microsoft is considering whether to introduce it. Until then, IE users
6%
The basics of domain-driven design
28.11.2023
Home
»
Archive
»
2023
»
Issue 78: Domai...
»
for the analysis of domains and the design of application-oriented software was filled by others. Popular methods include event storming [
6
], domain storytelling [7], or example mapping [8]. These methods have
6%
SSH Administration – Windows in a Unix World
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
saved in /home/khess/.ssh/id_rsa.pub.
09
the key fingerprint is: 10
6
d:2c:04:dd:bf:b2:de:e1:fc:52:e9:7f:59:10:98:bb khess@windows 11 The key's randomart image is:
12
+--[ RSA 2048]----+ 13 | .. . o
6%
Warding off the rise of VoIP spam
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
:alice@somesipprovider.de>;tag=42 07 Call-ID: a84b4c76e66710de5f90ae275 08 Contact: Alice
09
... The media data transferred in the course of a voice or video call are typically transported one
6%
A Distributed SQL Database
03.08.2023
Home
»
Archive
»
2023
»
Issue 76: Energ...
»
Catcher in the Rye', 'J.D. Salinger', '1951-07-16', 15.99), ('To Kill a Mockingbird', 'Harper Lee', '1960-07-11',
12
.99), ('Pride and Prejudice', 'Jane Austen', '1813-01-28', 9.99); At this point
6%
Warewulf 4 – Environment Modules
20.03.2023
Home
»
HPC
»
Articles
»
in to the first compute node (Listing 5). Listing 5: Checking Lmod on the Compute Node [laytonjb@warewulf ~]$ ssh n0001 Last login: Sun Feb
12 09
:10:32 2023 from 10.0.0.1 [laytonjb@n0001 ~]$ module
« Previous
1
...
26
27
28
29
30
31
32
33
34
35
Next »