search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(438)
Article
(140)
News
(5)
Blog post
(1)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
44
45
46
47
48
49
50
51
52
53
54
55
56
57
...
59
Next »
6%
Web applications with Julia
26.01.2025
Home
»
Archive
»
2025
»
Issue 85: Monit...
»
startserver() 05 WebSockets.listen("127.
0.0
.1", PORT) do ws 06 for msg in ws 07 d = Meta.parse(JSON.parse(msg)["
s
"]) 08 WebSockets.send(ws, """
You picked $d
6%
D-Wave's Murray Thom discusses the present and future of quantum computing.
13.12.2018
Home
»
Archive
»
2018
»
Issue 48: Secur...
»
increasingly difficult problems" explained Murray Thom, director of Quantum Cloud Services at D-Wave. Classical computers use bits of information that live in one state (
0
or 1) at a time. A quantum computer
6%
Password protection with Phpass
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
: " . $password . "\n
"; 13 echo "Hash: " . $hashvalue . "\n
"; 14 15 // Compare $password with the store has: 16 $passwordfromdb = '$P$9IQRaTwmfeRo7ud9Fh4E2PdI
0
S
3r.L
0
'; 17 // stored hash, would
6%
HPC fundamentals
16.08.2018
Home
»
Archive
»
2018
»
Issue 46: CMS S...
»
pdsh read the hosts from a file other than the WCOLL environment variable: $ pdsh -w ^/tmp/hosts uptime 192.168.1.4: 15:51:39 up 8:35,
12
users, load average:
0
.64,
0
.38,
0
.20 192.168.1.250: 15:47:53 up
6%
Pen Test Tips
30.04.2012
Home
»
Articles
»
in the Metasploit Framework itself. Start the Metasploit msfconsole console and load nessus : msf > load nessus Once the plugins are loaded, connect to the server. msf > nessus_connect cr
0
wn:password@localhost ok
6%
Credential management with HashiCorp Vault
09.10.2017
Home
»
Archive
»
2017
»
Issue 41: Kuber...
»
/vault/key.pem" tls_min_version = "tls
12
" } First, configure the server's back end, the place where Vault safely stores secrets. Here, you can choose different targets that can be used by Amazon
S
3 with a My
6%
Desktop Blades (of Glory)
06.05.2024
Home
»
HPC
»
Articles
»
Module 3+ (image credit: SparkFun Electronics; CC BY 2.
0
DEED). The initial carrier board was called the Compute Module 4 IO Board and had connectors for HDMI, Gigabit Ethernet, USB, microSD, PCI
6%
Let the Editor Wars Begin!
25.08.2016
Home
»
HPC
»
Articles
»
originated is the substitution command, which is what you use in vi to make a substitution on a specific line, set of lines, or the entire tile. For example, you can run the command: :
s
6%
Parallel I/O Chases Amdahl Away
12.09.2022
Home
»
HPC
»
Articles
»
Amdahl’
s
Law explains why the serial portion of applications don’t scale in performance as computing resources are added for the same problem size. The serial portions of an application can come
6%
Finding the fastest SD cards for the Raspberry Pi
03.08.2023
Home
»
Archive
»
2023
»
Issue 76: Energ...
»
was historically problematic for low-end SD cards. Run as iozone -e -I -a -
s
100M -r 4k -i
0
-i 1 -i 2 [-f /path/to/file] with the iozone [9] benchmark. Figure
« Previous
1
...
44
45
46
47
48
49
50
51
52
53
54
55
56
57
...
59
Next »