search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(68)
Article
(17)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
2
3
4
5
6
7
8
9
Next »
13%
Kernel and driver development for the Linux kernel
07.10.2014
Home
»
Archive
»
2014
»
Issue 23: 10 Ti...
»
_string;
08
09 static int prochello_show( struct seq_file *m, void *v ) 10 { 11 int error = 0;
12
13 error = seq_printf( m, "%s\n", output_string); 14 return error; 15 } 16 17 static int prochello
13%
Installing and operating the Graylog SIEM solution
13.12.2018
Home
»
Archive
»
2018
»
Issue 48: Secur...
»
. The pwgen command generates a password and encrypts with sh
256
sum: pwgen -N 1 -s 100 echo -n
| sha
256
sum The encrypted password is then assigned to the parameter root_password_sha2. Table 1 gives
13%
Automating development environments and deployment with Otto
11.02.2016
Home
»
Archive
»
2016
»
Issue 31: Tunin...
»
.com/hashicorp/otto/examples/mongodb" 06 } 07 }
08
09 project { 10 name = "my-project" 11 infrastructure = "my-infrastructure"
12
} 13 14 infrastructure "my-infrastructure" { 15 type = "aws" 16
13%
Vagrant, Serf, Packer, and Consul create and manage development environments
21.08.2014
Home
»
Archive
»
2014
»
Issue 22: OpenS...
»
_wait_timeout": "30s",
08
"shutdown_command": "echo 'Done' | sudo -S shutdown -h now" 09 }], 10 "provisioners": [{ 11 "type": "shell",
12
"inline": [ 13 "sleep 30", 14 "sudo apt-get update", 15
13%
The AWS CDK for software-defined deployments
05.02.2019
Home
»
Archive
»
2019
»
Issue 49: Anato...
»
under the Mozilla Public License (MPL) v
2.0
[7]. Visibility into the deployment state. It exposes its state to inspection (CloudFormation does not expose its state in any way, although it recently
13%
Resource Management with Slurm
05.11.2018
Home
»
HPC
»
Articles
»
# for your environment. 05 # 06 # 07 # slurm.conf file generated by configurator.html.
08
# 09 # See the slurm.conf man page for more information. 10 # 11 ClusterName=compute-cluster
12
Control
13%
Resource Management with Slurm
13.12.2018
Home
»
Archive
»
2018
»
Issue 48: Secur...
»
.conf file generated by configurator.html.
08
# 09 # See the slurm.conf man page for more information. 10 # 11 ClusterName=compute-cluster
12
ControlMachine=slurm-ctrl 13 # 14 SlurmUser=slurm 15 Slurmctld
13%
Profiling Python Code
09.12.2019
Home
»
HPC
»
Articles
»
| 14.70%| force[k,i] = force[k,i] - rij[k] * np.sin(
2.0
* d2) / d
256
| 0| 0| 0| 0.00%| # end for 257
13%
Registry for Docker images
01.08.2019
Home
»
Archive
»
2019
»
Issue 52: Stop...
»
is the registry – the storage space for Docker images – which did not even have a mechanism for authentication. Later, the image format was changed and Registry
2.0
(a.k.a., "Docker Distribution") was released
13%
HPC Cloud Storage
20.11.2013
Home
»
HPC
»
Articles
»
. Therefore, if I’m going to back up my data to cloud storage, I want to make sure the data is encrypted. S3QL encrypts all data using a
256
-bit AES key. An additional SHA-
256
HMAC checksum protects the data
« Previous
1
2
3
4
5
6
7
8
9
Next »