search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%25x20mm%253%2009 Llorente
?
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(32)
Article
(15)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
2
3
4
5
16%
VM and cloud management with openQRM
03.12.2015
Home
»
Archive
»
2015
»
Issue 30: OpenD...
»
machine. Initial evaluations on the practical conditions are easily possible on a well-equipped PC with a quad-core CPU, 1GB of RAM, a network interface card, and
20
GB of free hard disk storage
16%
Darshan I/O analysis for Deep Learning frameworks
27.09.2021
Home
»
Archive
»
2021
»
Issue 65: 7 Em...
»
counter = 1,counter_limit
25
my_record%
x
= counter 26 my_record%y = counter + 1 27 my_record%z = counter + 2 28 my_record%value = counter * 10.0 29
16%
Mailman 3.0 – a long time coming
08.10.2015
Home
»
Archive
»
2015
»
Issue 29: Rescu...
»
is a professional software tool, and the fan base appreciates its solid operating principles. Version 1.0 was released in mid-1999 [1], followed by
2.0
in
2000
. The latest stable branch 2.1 appeared about 12 years ... Mailman 3.0 is a new major version, released 15 years after version
2.0
. We put the new version through its paces and explain the installation procedure and new features.
16%
How to configure and use jailed processes in FreeBSD
14.03.2013
Home
»
Archive
»
2013
»
Issue 13: IPv6...
»
(pr->pr_path), 0); 17 [...] 18 error = copyinstr(j.hostname, 19 &pr->pr_host, sizeof(pr->pr_host), 0);
20
[...] 21 pr->pr_ip = j.ip_number; 22 pr->pr_linux = NULL; 23 pr->pr_securelevel = securelevel
16%
Darshan I/O Analysis for Deep Learning Frameworks
18.08.2021
Home
»
HPC
»
Articles
»
20
.04 system. I had to install some packages for the postprocessing (darshan-util ) tools to work: texlive-latex-extralibpod-latex-perl Different distributions may require different packages. If you
16%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home
»
Archive
»
2013
»
Issue 14: Samba 4
»
, one-time passwords, or both. Certificate-based two-factor authentication typically uses digital PKI certificates based on the
X
.509 standard. These are typically stored on a hardware certificate storage
16%
Server distributions for small businesses tested
11.02.2016
Home
»
Archive
»
2016
»
Issue 31: Tunin...
»
. Collax GmbH offers commercial subscription-based licenses from EUR400 per year for the Basic license up to EUR
2,000
per year for the Unlimited license. We installed version 5.8.2. The manufacturer cites
« Previous
1
2
3
4
5