search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%xcomm%3 000 Llorente"22
?
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(292)
Article
(104)
News
(7)
Blog post
(2)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
34
35
36
37
38
39
40
41
17%
How vector databases work and when they're used
04.12.2024
Home
»
Archive
»
2024
»
Issue 84: Non-R...
»
algorithms for the search. For example, a stored three-dimensional vector could be assigned the values [1.4,
3
.8, -0.8]. Each query to the database is also translated into a vector (e.g., [1.
3
,
3
.5, -0
17%
Compressed Archives for User Projects
11.08.2025
Home
»
Articles
»
09:52 data1_08022025.tar.gz 4 drwxrwxr-
x
3
laytonjb laytonjb 4096 Aug 2 09:55 . 4 drwxr-
x
--- 18 laytonjb laytonjb 4096 Aug 2 09:56 .. Now change directories into the mounted archive
17%
vSphere 5 vs. XenServer 6
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
]. Figure 1: Market share (%) of primary hypervisors in the US and UK 2011Q2. (Source: V-index [1]) XenServer 6 Vendor: Citrix [
3
]. Type:
x
86 hypervisor for virtual machines with almost any
17%
Getting started with I/O profiling
30.11.2025
Home
»
Archive
»
2012
»
Issue 08: FreeNAS
»
fsync 21 21 21 21 21
22
26 31 lseekm
3
,848 766 2,946 762 739 738 757
3
16%
Cloud security with AWS GuardDuty
04.08.2020
Home
»
Archive
»
2020
»
Issue 58: Graph...
»
-positive alerts, so you can focus on high severity only. According to a security research firm, FireEye, "Of the 17,
000
malware alerts an organization receives each week, only
3
,230 are considered reliable
« Previous
1
...
34
35
36
37
38
39
40
41