13%
31.10.2017
-very-proprietary world of GPU-accelerated high-performance computing. We sat down with ROCm Senior Director Greg Stoner to find out why ROCm could bring big changes to the HPC space.
ADMIN Magazine: How about if you
13%
22.12.2017
-very-proprietary world of GPU-accelerated high-performance computing (HPC). We sat down with ROCm Senior Director Greg Stoner to find out why ROCm could bring big changes to the HPC space.
ADMIN Magazine: How about
13%
27.09.2024
) are particularly critical, which together with attack surface management (ASM) makes it possible to determine where criticality for business operations and risks from attack surfaces are particularly high
13%
14.03.2013
_LANG=GERMAN_GERMANY.WE8MSWIN1252 (i.e., on the command line in DOS); the database then assumes that no transcoding is necessary because the two character sets are the same. The DOS client thinks that the characters
13%
11.06.2014
, the connection is opened with, for example:
virt-manager -c qemu+ssh://root@example.com/system
For security reasons, the SSH server should require a user login and reject root. As a compromise, you could go
13%
30.11.2025
the script directly off the network in a command line:
bash < <(curl -s https://rvm.beginrescueend.com/install/rvm)
The Bash script, which will run on Linux and OS X, uses Git to download more program code
13%
04.04.2023
to the vendors of programs. In this and many other places, the motto "Kubernetes first" applies. Infrastructure as Code and continuous integration/continuous deployment (CI/CD) pipelines with all kinds
13%
06.10.2022
with the lightweight and fast bring up/bring down behavior of containers to create a cloud VM kind of stack on a laptop? Can you also have the tooling that provides a declarative automation experience? The answer is yes
13%
07.10.2025
from suspicious data packets in network traffic and taking preventive measures before an attacker can exploit the opportunity.
Many services of this kind are on the market, Coroot [1] being just one
13%
31.10.2025
. This makes simple mirroring mainly useful for particularly sensitive data that is mostly read.
RAID 2-4
RAID levels 2, 3, and 4 avoid the high cost of mirroring by reducing redundancy slightly and computing