search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%25x20mm&213%2000 Llorente
?
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(34)
Article
(14)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
2
3
4
5
16%
Let the editor wars begin!
11.10.2016
Home
»
Archive
»
2016
»
Issue 35: Persi...
»
, interesting, and worthwhile exercise. I argue that systems administration needs a command-line editor, because it can be used even if
X
windows isn't working or isn't installed on the servers. Knowing how
16%
Expand your sphere with a piece of Google
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
or newer. Python programmers need to use version
2.5
; the SDK and the environment on the Google servers do not support the current Python 3.0. The SDK for Go exists at the moment only for Linux and Mac OS
X
16%
Creating KVM machines with BoxGrinder and VMBuilder
31.10.2025
Home
»
Archive
»
2012
»
Issue 12: NAS S...
»
Service (Amazon
S
3) 19 - ami plugin for Amazon Simple Storage Service (Amazon
S
3)
20
- sftp plugin for SSH File Transfer Protocol 21 - ebs plugin for Elastic Block Storage 22 - local plugin
16%
Darshan I/O Analysis for Deep Learning Frameworks
18.08.2021
Home
»
HPC
»
Articles
»
20
.04 system. I had to install some packages for the postprocessing (darshan-util ) tools to work: texlive-latex-extralibpod-latex-perl Different distributions may require different packages. If you
16%
How to configure and use jailed processes in FreeBSD
14.03.2013
Home
»
Archive
»
2013
»
Issue 13: IPv6...
»
(pr->pr_path), 0); 17 [...] 18 error = copyinstr(j.hostname, 19 &pr->pr_host, sizeof(pr->pr_host), 0);
20
[...] 21 pr->pr_ip = j.ip_number; 22 pr->pr_linux = NULL; 23 pr->pr_securelevel = securelevel
16%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home
»
Archive
»
2013
»
Issue 14: Samba 4
»
, one-time passwords, or both. Certificate-based two-factor authentication typically uses digital PKI certificates based on the
X
.509 standard. These are typically stored on a hardware certificate storage
16%
Managing FOSS applications on AIX
27.05.2025
Home
»
Archive
»
2025
»
Issue 87: Light...
»
:svrmtype:priority:signorm:sigforce:display:waittime:grpname:mariadb::-c "ulimit -n unlimited; ulimit -c 10; ulimit -m unlimited; ulimit -d unlimited; /opt/freeware/libexec/mysqld" :/usr/bin/sh:27:0:/dev/console:/dev/console:/dev/console:-O:-Q:-
S
:0:0:
20
:15:9:-d:
20
:: Now
15%
Server distributions for small businesses tested
11.02.2016
Home
»
Archive
»
2016
»
Issue 31: Tunin...
»
. Collax GmbH offers commercial subscription-based licenses from EUR400 per year for the Basic license up to EUR
2,000
per year for the Unlimited license. We installed version 5.8.2. The manufacturer cites
« Previous
1
2
3
4
5