38%
14.03.2013
cases, SQL injection was the root cause of a server's compromise.
36%
15.12.2011
AMD has announced that its Fusion12 Developer Summit (AFDS) will be held June 11-14, 2012, at the Hyatt Regency Bellevue and Meydenbauer Center in Bellevue, Washington.
So, if you're developing ...
AMD announces the Fusion12 Developer Summit (AFDS) June 11-14, 2012.
36%
27.12.2011
XSEDE12, the first conference of the Extreme Science and Engineering Discovery Environment, will be held July 16-19, 2012, at the InterContinental hotel in downtown Chicago.
XSEDE, which has ...
The Extreme Science and Engineering Discovery Environment conference of 2012 to be held in Chicago, Illinois, USA.
35%
27.09.2012
According to the press release, Rogue Wave ThreadSpotter 2012.1 provides comprehensive performance optimization for single and multithreaded applications on Cray XE systems. The new version ...
Rogue Wave Software releases ThreadSpotter 2012.1 with support for Cray Inc.’s line of Cray XE supercomputers.
... Rogue Wave Releases ThreadSpotter 2012.1
33%
11.06.2014
The SMB protocol is mainly known as the basis for file sharing in Windows and is familiar to Samba and Linux users, too. Windows 8.1 and Windows Server 2012 R2 use the new Server Message Block 3 ... Microsoft has introduced several improvements to Windows Server 2012 and Windows Server 2012 R2 with its Server Message Block 3. Hyper-V mainly benefits from faster and more stable access to network
32%
06.08.2012
-xr-x 2 khess khess 4096 2012-07-03 15:59 Desktop
drwxr-xr-x 2 khess khess 4096 2012-07-03 15:58 Documents
-rw-r--r-- 1 root root 0 2012-07-07 15:04 goo.txt
-rw-r--r-- 1 khess khess 49 2012
31%
29.12.2011
and profiles, CA security, revocation mechanisms, use of algorithms and key sizes, audit requirements, liability, and privacy.
These “Baseline Requirements” will take effect July 1, 2012, giving CAs time
30%
10.07.2012
-07-03 15:59 Desktop
drwxr-xr-x 2 khess khess 4096 2012-07-03 15:58 Documents
-rw-r--r-- 1 root root 0 2012-07-07 15:04 goo.txt
drwxr-xr-x 2 khess khess 4096 2012-07-03 15:58 Music
-rw
30%
21.08.2014
.
Rooting Android
Because Google has overturned the popular Linux architecture, anyone who needs to do a little more on an Android device than Google allows first needs root access. Root access is not always
29%
03.02.2014
the purchase Motorola's Mobile Device Division in 2011 and completed the purchase in 2012. At the time, experts speculated that the real prize was Motorola's 17,000 patents, which Google would need