search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(276)
Article
(96)
News
(12)
Blog post
(2)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
28
29
30
31
32
33
34
35
36
37
38
39
Next »
17%
Better compression of web pages
22.12.2017
Home
»
Archive
»
2017
»
Issue 42: Secur...
»
and Brotli Comparison 01 -rw-r--r-- 1 sw sw 124 8 Sep 16:
52
hello-world.html 02 -rw-r--r-- 1 sw sw 77 8 Sep 16:53 hello-world.html.br 03 -rw-r--r-- 1 sw sw 113 8 Sep 16:53 hello
17%
First steps in IT automation by Rex
11.06.2014
Home
»
Archive
»
2014
»
Issue 21: Manag...
»
on the Rex host and then copy the public key over to the client (Listing
3
). After that, a test login on the client without password should work. Listing
3
Key-Based Authentication 01 root
17%
Getting the most from your cores
11.10.2016
Home
»
Archive
»
2016
»
Issue 35: Persi...
»
, the exact details of these components varies from processor to processor, making CPU utilization comparison difficult. Current processors can have shared L
3
caches across all cores or shared L2 and L1 caches
17%
Udev with virtual machines
14.11.2013
Home
»
Archive
»
2013
»
Issue 17: Cloud...
»
-persistent-net-generator.rules openSUSE, Red Hat
6
* /etc/udev/rules.d/70-persistent-net.rules* No net generator rules since 12.
3
. Instead, the biosdevname package is used to identify the NICs
17%
Embarrassingly parallel computation
01.06.2024
Home
»
Archive
»
2024
»
Issue 81: Load...
»
PI resulting in a brief burst of computation on cores 0, 1, and
6
(Figure 4) and an approximation of pi (purely out of randomness and geometry) to
3
.139, computed in just half a second (Figure 5). Executing
17%
Tech News
27.09.2024
Home
»
Archive
»
2024
»
Issue 83: Storage
»
and theft in non-production environments, while 53 percent reported data corruption and alteration, and
52
percent cited audit issues and failures. Read more at Delphix (https://www
17%
Controlling virtual machines with VNC and Spice
14.03.2013
Home
»
Archive
»
2013
»
Issue 13: IPv6...
»
52
). Figure 2: QXL driver problems on Windows 7. Conclusions The graphics system plays a subordinate role in server use scenarios; in fact
17%
Throw Down the Gauntlet
14.08.2018
Home
»
Archive
»
2018
»
Issue 47: Findi...
»
"/>
52"/>
3"/>
17%
Security as Code
04.10.2018
Home
»
Archive
»
2018
»
Issue 47: Findi...
»
="filtered" reason="no-response" reason_ttl="0"/>
17%
How to query sensors for helpful metrics
22.05.2023
Home
»
Archive
»
2023
»
Issue 75: Teamwork
»
>:161"] version = 2 community = "public" name = "snmp" [[inputs.snmp.field]] name = "Battery Temperature" oid = "1.
3.6
.1.4.1. 318.1.1.1.2.2.2.0" [[inputs.snmp.field]] name = "Power
« Previous
1
...
28
29
30
31
32
33
34
35
36
37
38
39
Next »