16%
13.06.2016
Some people consider container systems like Docker [1] a new form of virtualization – a natural continuation of KVM [2], Xen [3], VMware [4], Hyper-V [5], and the Zones concept in Solaris [6
16%
10.04.2015
. This is still the case with complex enterprise applications based on J2EE.
Integration capability: Java applications can act as one component in the greater context and may need to adapt to match the look
16%
20.03.2014
OpenResty [1] is the Nginx server [2] bundled with many useful modules. Developed almost single-handedly by Yichun "agentzh" Zhang while living and working in Beijing, China, then San Francisco
16%
02.06.2020
, such as MS-CHAP (Challenge-Handshake Authentication Protocol), MS-CHAP v2, or PAP (Password Authentication Protocol). You can also specify EAP. EAP types include, for example, protected EAP (PEAP), secured
16%
04.12.2024
.*)' | grep -v ' -> ' | cut -f3 -d'/')
do
git checkout "${mybranch}"
git pull
done
The git branch -a command in the first line returns the names of all branches in the repository. For the purpose
16%
11.02.2016
, you can use Microsoft Forefront Identity Manager (FIM) 2012 R2 or, even better, Microsoft Azure Active Directory Connector [2]. The data must be synchronized before you configure the hybrid deployment
16%
09.04.2019
download the gateway appliance. For local use, AWS provides a VM as an image for ESXi (OVA), Hyper-V 2008 R2, or Hyper-V 2012. The suitable gateway Amazon Machine Image (AMI) for use under EC2 is available
16%
20.05.2014
kernel version 2.6.20, ip6tables has supported stateful inspection, wherein the firewall automatically assigns response packets to a communication channel and allows communication where appropriate
16%
04.12.2024
.1, -0.2, 0.91, 0.7, -0.21, 0.1 -0.7, 0.4]
This numerical expression contains the coordinates of the words in a multidimensional space. When a sentence, an image, or a video is converted into a vector
16%
27.09.2021
additional libraries and options into the linker command line to intercept relevant I/O calls" [2] (section 5.1).
For MPI applications, you can also profile pre-compiled binaries. It uses the LD