16%
30.11.2025
Cloud computing is, without a doubt, the IT topic of our time. No issue pushes infrastructure managers with large-scale enterprises as hard as how to best implement the cloud. The IaaS principle
16%
11.06.2014
, and infinitely performant. It's the best of both worlds for technical people and bean counters alike. Google Compute Engine is a stellar IaaS (Infrastructure as a Service) example that is part of a larger suite
16%
09.10.2017
in turn stores as a separate time series. The software can already cope with millions of time series, yet version 2.0 [6] should cover more extreme Kubernetes environments with thousands of nodes
16%
11.06.2014
application server.
On a system in a stable state, throughput initially is not affected by file operations, but after a certain value (e.g., 16,384MB), performance collapses. As Figure 1 shows
16%
18.07.2013
]
03
04 enabled = true
05 port = http,https
06 filter = naxsi
07 logpath = /var/log/nginx/error.log
08 maxretry = 6
09 banaction = iptables-multiport-log
10 action = %(action_mwl)s
11
12 # filter
16%
05.12.2014
and document the evidence
Principle 6: Content is king
The subtext of each of these principles is that a graphic should tell a complete, credible story while recognizing that "analytical presentations
16%
07.06.2019
-p ${CASC_JENKINS_CONFIG} && mkdir -p ${JENKINS_HOME}/plugins && adduser -h ${JENKINS_HOME} -u ${UID} -s /bin/bash -D ${JENKINS_USER} && chown -R ${UID} ${JENKINS_HOME} ${CASC_JENKINS_CONFIG}
20
21
16%
09.08.2015
to form a page (e.g., 8KB). Several pages then form a block (~2MB).
At this level, the first peculiarity of flash memory already comes to light: Whereas new data can be written to unused pages, subsequent
16%
17.03.2021
in a custom deskside chassis. A third system, from Cray, used commodity processors with custom motherboards and chassis. It focused on incorporating Cray’s high-performance computing (HPC) expertise
16%
20.05.2014
, it lacks all proxy-based features such as HTTP(S), SMTP, and POP3 and thus antivirus scanning, URL filtering, and application control. In terms of VPN protocols, however, IPsec and OpenVPN are missing; only