13%
01.06.2024
to cope with both predictable and unexpected increases in demand.
In this article I create an AKS cluster in Azure with the platform-provided command-line tool az, which is often referred to as the Azure
13%
25.02.2016
one class to the next) was used on a laptop with 8GB of memory using two cores (OMP_NUM_THREADS=2
).
Initial tests showed that the application finished in a bit less than 60 seconds. With an interval
13%
11.10.2016
and the Class B "size" standard test (a four times size increase going from one class to the next) was used on a laptop with 8GB of memory using two cores (OMP_NUM_THREADS=2).
Initial tests showed
13%
12.09.2013
Intune lets admins centrally monitor not only computers and laptops, but also smartphones and tablets (Figure 1). In particular, businesses who rely on Windows Server 2012, Windows 8 and Windows Phone 8
13%
27.09.2024
representative) survey at this year's Chemnitz Linux Days. Anyone in possession of a FIDO2 stick [2] can use it for SSH authentication – provided SSH, at least version 8.2p1 or preferably version 8.3, is available
13%
07.07.2025
admins have tools that use these logs to provide notifications, they are not easy to process and understand. Wouldn't it be nice to be able to put your own information into the system log (/var/log/syslog
) so
13%
26.03.2025
, etc. The service is very rarely used in local environments but provides the technology basis for Azure Information Protection, which evolved into Microsoft Information Protection and finally Microsoft
13%
25.08.2016
, in that it operates on individual lines or groups of lines that you have to specify at the command line. In today's *nix world, it is a “personality” of vi and provides some functionality that vi cannot, so if you have
13%
11.10.2016
and provides some functionality that Vi cannot, so if you have learned Vi, you already know some ex commands.
You can start ex on the command line in most Linux distributions by simply typing ex
13%
11.04.2016
rely on stolen login credentials. For example, if a user logs on to the file server from their laptop, a large volume of data is transferred. If the user then accesses other services