search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(736)
Article
(267)
News
(33)
Blog post
(3)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
28
29
30
31
32
33
34
35
36
37
38
39
40
41
...
104
Next »
17%
Managing virtual machines
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
/sysconfig/network-scripts/ifcfg-eth
0
-e "
s
/
/
/" You need a similar approach with the Udev rules mentioned earlier. In this way, you can also replace the hostname so that it matches the name assigned during
17%
Network monitoring with Icinga and Raspberry Pi
17.02.2015
Home
»
Archive
»
2015
»
Issue 25: Safe...
»
Load 30 check_command check_nrpe!check_load!5.
0
!4.
0!3.0!10.0!6.0!4.0
31 } 32 define service{ 33 use generic-service ; Name of service
17%
Build a honeypot with real-world alerts
01.08.2019
Home
»
Archive
»
2019
»
Issue 52: Stop...
»
. The takeaway is the -j LOG option (line 12), which logs port scanning behavior to a logfile with the iptables: prefix. Listing 1 iptable Rules 01 *filter 02 *filter 03 :INPUT ACCEPT [
0:0
] 04
17%
Exploiting, detecting, and correcting IAM security misconfigurations
07.04.2022
Home
»
Archive
»
2022
»
Issue 68: Autom...
»
as the ability to pass roles. With those privileges, the adversary is able to escalate the privileges inside the account, run an EC2 instance, and exfiltrate information stored in a Simple Storage Service (
S
3
17%
Darshan I/O Analysis for Deep Learning Frameworks
18.08.2021
Home
»
HPC
»
Articles
»
) 9,248 max_pooling2d (MaxPooling2D) (None, 16, 16, 32)
0
conv2d_2 (Conv2D) (None, 16, 16, 64) 18,496 conv2d_
3
(Conv2D) (None, 16, 16, 64
17%
Lmod – Alternative Environment Modules
30.01.2013
Home
»
HPC
»
Articles
»
, for a library that uses a specific compiler and MPI library, you would end up with a module names like atlas-
3.10.0
-opempi-1.6.2-open64-5.
0
. The name is useful because it tells the user the library version
17%
ratarmount Archive Mount Tool
07.09.2025
Home
»
Articles
»
for 5 folders up to a depth of
3
in
0
.0264
s
for faster union mount. Created mount point at: /home/laytonjb/DATA_STORE/DATA1 The mounting process gives you some information about what it’
s
just done
17%
OpenACC – Parallelizing Loops
09.01.2019
Home
»
HPC
»
Articles
»
3
: Gang Execution Fortran C !$acc parallel do i=1,n ! do something enddo !$acc end parallel #pragma acc parallel { for (int i=
0
; i
17%
Explore automation-as-code with Ansible
04.12.2024
Home
»
Archive
»
2024
»
Issue 84: Non-R...
»
Shift or – as shown here – an Ingress route for accessing the AWX service. This strategy also works with MicroK8
s
or K
3
s
. You might have to adjust the Ingress definition if routers such as Traefik cannot cope
17%
Red Hat Enterprise Linux 8.3 Available
02.11.2020
Home
»
News
»
-native needs, 8.
3
includes updated container images for Buildah and Skopeo, as well as Podman 2.
0
. With the Podman 2.
0
release, developers can work with a new REST API, which was designed with two layers: libpod ... Red Hat has released RHEL 8.
3
, which includes a number of serious improvements for delivering at scale. ... Red Hat Enterprise Linux 8.
3
Available
« Previous
1
...
28
29
30
31
32
33
34
35
36
37
38
39
40
41
...
104
Next »