38%
05.08.2024
the platform in line with your own wishes. How exactly does the technology work? What configuration options do you have? Can the source code be changed to open up new possibilities? Why was a technology decision
38%
19.06.2013
with which we have been accustomed cannot go on forever. Although Moore’s Law still seems to be holding, it does not always translate into linear performance gains. Consider the graph of CPU clock frequency
38%
23.04.2013
Reduce is a methodology used by Google to process large amounts of web data. Indeed, the now famous Google MapReduce paper was the inspiration for Hadoop.
The MapReduce idea is quite simple and, when used in parallel, can
38%
25.08.2011
, such as disconnected use, and even Linux virtual desktops. This is what we do today and what is driving this technology into the mainstream.
Q: The thin client paradigm has been around for years. How does the modern
38%
12.11.2011
, it sounds like you’re making improvements on the cooling technology, and also the use of space. Who is going to use this? Who are your biggest customers?
BM: The ICE platform does span a wide variety
38%
10.05.2012
Shell is easy to learn and use, you should always document your scripts – in the scripts themselves. Describe what a script does and why you wrote it. Date and version your scripts to keep track of their usage
38%
19.04.2018
a backup of each existing destination file
-b
Like --backup
, but does not accept an argument
-f
, --force
Do not prompt before overwriting
-i
, --interactive
38%
15.05.2023
“almost always compatible” because in some cases a package maintainer introduces a minor package update that breaks compatibility. I’m sure the maintainer’s goal was not to do this, but it does happen
38%
08.04.2024
file timestamps for the files specified on the command line:
$ touch example.out
If the file exists, touch
updates the access and modification times of the file. However, it does not change the time
38%
13.12.2018
be exploited directly for attacks, it contributes significantly to the fact that attacks that take place are not detected, which plays into the hands of the attackers.
How much does a penetration test show