12%
29.09.2020
, "Kubernetes k3s Lightweight Distro" [6], which discusses using the magically tiny K3s within Internet of Things (IoT) applications.
The name of K3s came from Kubernetes' often abbreviated form K8s; according
12%
17.06.2017
/en/technologies/storage/ceph
Ceph blog post: http://ceph.com/geen-categorie/getting-started-with-the-docker-rbd-volume-plugin/
REX-Ray documentation: http://rexray.readthedocs.io/en/stable/
REX-Ray code: http://github.com
12%
25.03.2021
for privileged accounts such as domain or organization administrators. Active Directory (AD) offers, among other things, the Protected Users group and authentication policies for this purpose.
AD entered
12%
11.02.2016
for the login or receive a text message containing a login code. The most convenient login is certainly the phone call because they only need to press the #
key.
When using a mobile app, Office 365
12%
11.10.2016
there, but I know for a fact the source code installs on my Ubuntu 16.04 and Linux Mint systems.
The latest, stable version of Bro is 2.4.1. This latest version is the best documented version
12%
30.01.2024
email in their name.
linuxrocks.es. 3600 IN TXT "v=spf1 a:linuxmag.operationalsecurity.es -all"
Proper DKIM records sets up a mechanism that uses public key cryptography to certify that your
12%
25.09.2023
presidential campaign, he said, he had taken part in various voter mobilization groups, gaining interest in election and civil rights issues, and Weil has been active in precisely these areas, more or less
12%
13.10.2021
with various HPC applications. In this article, I present examples for (1) serial applications, (2) OpenMP applications, and (3) MPI applications. I’ll use the same architecture as before: a single-socket system
12%
13.12.2018
Protocol (NHRP) as a way for the router to get details about its peer and published it as RFC 2332 [1]. Finally, the open source community has built its own implementation, OpenNHRP, and provides the code
12%
07.01.2014
version, then a backup allows you to go back to a previous version of the file and restore it. In a similar case, if someone is editing code and discovers they need to go back to a version of the program