search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(378)
Article
(118)
News
(34)
Blog post
(3)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
41
42
43
44
45
46
47
48
49
50
51
52
53
54
Next »
30%
Managing virtual infrastructures with oVirt 3.1
31.10.2025
Home
»
Archive
»
2012
»
Issue 11: Cloud...
»
, 50GB of memory, and a 1Gb NIC. However, the CPU must be a 64-bit system with a mandatory virtualization extension: either AMD-V or Intel VT. In contrast to RHEV
2.2
, RHEV 3 is no longer based on RHEL
30%
Reading and understanding database execution plans
31.10.2025
Home
»
Archive
»
2012
»
Issue 12: NAS S...
»
----------------------------------------------------------------- 21
22
Predicate Information (identified by operation id): 23 --------------------------------------------------- 24 1 - access("S"."EMPLOYEE_ID"="E"."EMPLOYEE_ID")
25
2 - filter<+>5<+>( "S
30%
Passwords, passphrases, and passkeys
26.03.2025
Home
»
Archive
»
2025
»
Issue 86: Data...
»
than eight characters. In practice, passwords created according to the above-mentioned rules (e.g., dU7%9IL& ) that you are then forced to change every three months will quickly mutate to Summer
25
30%
Security data analytics and visualization with R
05.12.2014
Home
»
Archive
»
2014
»
Issue 24: Visua...
»
("(?i)