search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(620)
Article
(146)
News
(12)
Blog post
(1)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
39
40
41
42
43
44
45
46
47
48
49
50
51
52
...
78
Next »
9%
RESTful APIs in practice
09.10.2017
Home
»
Archive
»
2017
»
Issue 41: Kuber...
»
. 123197
12
Dr. House Solutions Gmbh | Mon,
12
.Aug 2013 | -1753.2 | rent July 2012 13 Airfreu Ag | Tue, 13.Aug 2013 | 2300.
0
| salary 14 Christoffel Mission to the Blind | Wed, 14.Aug 2013 | -30.
0
| Elv14ß
9%
Advanced MySQL security tips (a complete guide)
30.05.2021
Home
»
Archive
»
2021
»
Issue 63: Autom...
»
command: $ cat /var/lib/mysql/testDB/testTB.ibd | head -
n
20 The command output will generate plaintext information containing raw data stored in the corresponding database table. Key Management
9%
Retrieving Windows performance data in PowerShell
10.04.2015
Home
»
Archive
»
2015
»
Issue 26: OpenS...
»
-WMIObject Win32_OperatingSystem | fl Name, BuildNumber, Version Name: Microsoft Windows 8.1 Enterprise|C:\Windows|\Device\Harddisk
0
\Partition4 BuildNumber: 9600 Version: 6.3.9600 The command
9%
New versions of the Endian and Sophos UTM solutions
20.05.2014
Home
»
Archive
»
2014
»
Issue 20: IPv6...
»
available in both free and commercial versions. According to the manufacturer, more than 4,000 customers deploy Endian Firewall Enterprise, and more than
1.2
million users have downloaded the community
9%
File access optimization discovery and visualization
27.05.2025
Home
»
Archive
»
2025
»
Issue 87: Light...
»
classifies each pair into self-defined optimization categories. Category
0
means it cannot be optimized. Category 1 means it can easily be optimized. Category 2 means that although one or more other
9%
Detecting malware with Yara
09.10.2017
Home
»
Archive
»
2017
»
Issue 41: Kuber...
»
= "A pdf file that contains a bad link" 10 11 strings:
12
$pdf_magic = {68 47 77 22} 13 $s_anchor_tag = "
0 and (#s
9%
Tuning I/O Patterns in Fortran 90
04.12.2013
Home
»
HPC
»
Articles
»
3 type rec 4 integer :: x, y, z 5 real :: value 6 end type rec 7 8 integer :: counter 9 integer :: counter_limit 10 integer :: ierr 11
12
type (rec) :: my
9%
Malware Analysis
11.06.2014
Home
»
Archive
»
2014
»
Issue 21: Manag...
»
at the bottom of the window, ranges from
0
(less risky) to 100 (more risky). Because these two processes started after the malware installed, they are likely bad. When I compared the Start Time of svchost
9%
Creating SmartOS zones using UCARP
05.12.2014
Home
»
Archive
»
2014
»
Issue 24: Visua...
»
_domain": "yourdomain.com", 06 "dataset_uuid": "d34c301e-10c3-11e4-9b79-5f67ca448df
0
", 07 "resolvers": [ 08 "192.128.
0
.9", 09 "192.128.
0
.10" 10 ], 11 "max_physical_memory": 4096,
12
"nics": [ 13
9%
Managing Linux Memory
11.06.2014
Home
»
Archive
»
2014
»
Issue 21: Manag...
»
application server. On a system in a stable state, throughput initially is not affected by file operations, but after a certain value (e.g., 16,384
MB
), performance collapses. As Figure 1 shows
« Previous
1
...
39
40
41
42
43
44
45
46
47
48
49
50
51
52
...
78
Next »