search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
[x]
Creation time
: Last three months
Sort order
Date
Score
Content type
Article (Print)
(53)
Article
(1)
News
(1)
Keywords
« Previous
1
2
3
4
5
6
Next »
48%
The Ruby Version Manager (RVM) hands-on
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
and will always load the latest version of a Gem, instead of a specific version, and this can
lead
to compatibility issues. A useful approach in this case is to maintain Gems in a project-specific way instead
48%
Neglected IPv6 features endanger the LAN
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
document [5] mandatorily calls for RA filter mechanisms on Layer 2 switches. Initial experience shows that even
leading
manufacturers are unfortunately only implementing this feature in the latest hardware
48%
Check your VoIP networks with SIPVicious and sngrep
30.11.2025
Home
»
Archive
»
2025
»
Issue 90 VoIP N...
»
. Jitter occurs when packet transit times vary (e.g., because of network congestion, different routes, or hardware delays). These fluctuations
lead
to audible disturbances such as dropouts or distorted audio
48%
Expand your sphere with a piece of Google
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
the output directly in Python script. This approach will
lead
to unmanageable spaghetti code sooner or later. It makes far more sense to separate the display from the content. Google has taken
48%
Mandatory access control with Tomoyo Linux
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
of all previous programs and scripts
leading
to the process being run, going right back to the kernel, which uses the special
domain name (Figure 2). The sshd daemon's domain is thus
48%
Introduction to behavior-driven monitoring
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
to the infrastructure. This means not just monitoring from an object's point of view (the application is running) but also considering the process that
leads
to the desired results (the application is performing
48%
Clustering with OpenAIS and Corosync
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
just frozen temporarily and will wake up again after a certain amount of time and want to access its resources again while a second machine tries to do the same thing. A situation like this could
lead
48%
Generating information with the touch of a button
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
and so-called "event handlers" in either Java or JavaScript that process your data and change the appearance as necessary. The detailed tutorial on the Eclipse BIRT website
leads
you through the process
48%
Touring the top Knoppix debugging and rescue tools
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
corruption can get worse, which might
lead
to losing a complete disk read/write head. Copy the complete disk, not just the parts you assume are relevant (unless you don't have enough time for a complete
48%
Script utilities in depth: grep, awk, and sed
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
some
leading
spaces, sed replaces that hash mark and a following t (either uppercase or lowercase), if present, with #p and adds an additional keyword following it: sed -i '/^ *#/s/#[ tT] */#p iop1
« Previous
1
2
3
4
5
6
Next »