search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(463)
Article
(74)
News
(4)
Blog post
(2)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
33
34
35
36
37
38
39
40
41
42
43
44
45
46
...
55
Next »
17%
Administering virtual machines with PowerShell Direct
15.08.2016
Home
»
Archive
»
2016
»
Issue 34: Softw...
»
a more direct route via VMBus: > Copy-VMFile -VM dc1 -SourcePath C:\udat\
09
-11-2015_11964.txt -DestinationPath C:\share This process also requires that you make the guest services available as part
17%
Ansible collections simplify AIX automation
05.08.2024
Home
»
Archive
»
2024
»
Issue 82: Sover...
»
/.ansible/collections:/usr/share/ansible/collections executable location = /usr/bin/ansible python version =
3
.11.2 (main, Feb 17 2023,
09
:48:02) [GCC 8.5.0 20210514 (Red Hat 8.5.0-18)] (/usr/bin/python
3
.11) jinja version =
3
.1.2 libyaml = False
17%
Operating systems for the cloud and containers
14.08.2017
Home
»
Archive
»
2017
»
Issue 40: Lean...
»
. The most popular distributions that follow the lean approach are CirrOS [1], Alpine [2], JeOS (just enough operating system) [
3
], and the operating system formerly known as CoreOS [4], now called Container
17%
What's left of TLS
18.07.2013
Home
»
Archive
»
2013
»
Issue 15: What’...
»
allowing strong encryption under state control – with a third key, which would be deposited with the secret service. After that, Netscape published SSLv
3
to fix at least the worst of the security problems
17%
Tuning loops – from loop unrolling to Duff's device
28.07.2025
Home
»
Archive
»
2025
»
Issue 88: 5 Net...
»
of all evil" sums up this point of view neatly [
3
]. The reasons for such a statement are particularly apparent in the many mangling strategies one can choose to apply to loops (Table 1). These strategies
17%
Security as Code
04.10.2018
Home
»
Archive
»
2018
»
Issue 47: Findi...
»
="filtered" reason="no-response" reason_ttl="0"/>
17%
Understanding Layer 2 switch port security
22.12.2017
Home
»
Archive
»
2017
»
Issue 42: Secur...
»
:1071867223(0) win 512 98:15:eb:38:f
3
:c1 c8:d7:c1:61:be:a
3
0.0.0.0.30693 > 0.0.0.0.57646: S 1759104040:1759104040(0) win 512 dc:6d:43:15:be:
52
99:19:41:22:4e:36 0.0.0.0.29211 > 0.0.0.0.63665: S 481173385
17%
Script utilities in depth: grep, awk, and sed
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
/share/zoneinfo -type f | \ 07 grep -v 'posix|right|Etc|SystemV | \ 08 grep -i $city`
09
echo -n "Time in $1: "; TZ=`echo $z` date The first section of this code ensures that the script's argument
17%
Exploring the Xeon Phi
05.11.2013
Home
»
Articles
»
processor managed only
0.9
GFLOPS per watt with a total capacity of 85GFLOPS. Unfortunately, the Polaris was extremely difficult to program and was never available as a commercial product – only five people
17%
Server virtualization with Citrix XenServer
04.08.2011
Home
»
CloudAge
»
Articles
»
EUR 750 per server will take you a long way. If you intend to virtualize both Windows and Linux systems, the current version of XenServer is a good choice. Check out links [
3
] through [5
« Previous
1
...
33
34
35
36
37
38
39
40
41
42
43
44
45
46
...
55
Next »