search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(50)
Article
(12)
News
(2)
Keywords
« Previous
1
2
3
4
5
6
7
Next »
33%
Get to know Azure Files and Azure File Sync
27.09.2024
Home
»
Archive
»
2024
»
Issue 83: Storage
»
.file.core.windows.net\cloudysharethingy" -UserName "cloudyfilethings" -Password "
" Folders and files that you save in the file share on Windows from this
point
on will also appear when you use the Browse item to view the share
33%
Introducing the NoSQL MongoDB database
04.12.2024
Home
»
Archive
»
2024
»
Issue 84: Non-R...
»
performance. Another important
point
is the flexibility gains during development. Programmers have control over the database schema; they can customize the database schema without the help of a database
33%
Vector databases for data-driven artificial intelligence
04.12.2024
Home
»
Archive
»
2024
»
Issue 84: Non-R...
»
compare various data
points
in network traffic with normal behavior patterns to identify anomalies by the distance to the typical vectors. Particularly in business sectors such as finance and security
33%
Tuning loops – from loop unrolling to Duff's device
28.07.2025
Home
»
Archive
»
2025
»
Issue 88: 5 Net...
»
of all evil" sums up this
point
of view neatly [3]. The reasons for such a statement are particularly apparent in the many mangling strategies one can choose to apply to loops (Table 1). These strategies
33%
Compressed Archives for User Projects
11.08.2025
Home
»
Articles
»
control this project. The cool thing is that I can do everything as a user and don’t need any intervention by root, which is the
point
of this article. I’ll begin by reviewing both FUSE and
33%
Anonymization and pseudonymization of data
26.03.2025
Home
»
Archive
»
2025
»
Issue 86: Data...
»
, changing the original data by adding noise or random modifications (Figure 1). This method ensures that individual data
points
can no longer be traced back to the original values. One example of perturbation
33%
TUI Tools for Containers
07.10.2024
Home
»
HPC
»
Articles
»
. These conditions
point
toward text-based user interface (TUI) tools. The specific tools that can be used are text editors or IDEs and some monitoring tools for the container. I don’t use IDEs, so I will just use
33%
IO500
02.02.2025
Home
»
HPC
»
Articles
»
a conclusion. I like “contrast” because it
points
out differences and does not imply a conclusion.) Goals and Workloads At the start of the IO500, the founding members created a set of goals that drove its
33%
Tech News
26.01.2025
Home
»
Archive
»
2025
»
Issue 85: Monit...
»
environments powered by OpenTelemetry, with more than 40 out-of-the-box dashboards providing a holistic view of the entire stack. Cost-effective entry
point
: Transparent, usage-based pricing with no hidden
33%
Networking strategies for Linux on Azure
27.09.2024
Home
»
Archive
»
2024
»
Issue 83: Storage
»
-based environments. It operates at the transport layer (Layer 4) and is designed to distribute incoming network traffic across multiple VMs within a VNet, ensuring that no single VM becomes a bottleneck or
point
« Previous
1
2
3
4
5
6
7
Next »