search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%xcomm 22 000 Llorente"5432
?
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(57)
Article
(18)
Blog post
(1)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
2
3
4
5
6
7
8
Next »
13%
Error-correcting code memory keeps single-bit errors at bay
14.11.2013
Home
»
Archive
»
2013
»
Issue 17: Cloud...
»
/bit-hr) to 1017 (seven orders of magnitude difference). The lower number is just about one error per gigabit of memory per hour. The upper number indicates roughly one error every 1,
000
years per gigabit of memory
13%
Asynchronous PostgreSQL
12.09.2013
Home
»
Archive
»
2013
»
Issue 16: Docker
»
$st2->execute($dbh->{pg_pid}); 16 if( !$st2->fetchrow_arrayref->[0] ) { 17 warn "couldn't stop backend PID=$dbh->{pg_pid}\n"; 18 } 19 exit 1;
20
} 21
22
POSIX::sigaction(SIGTERM, POSIX
13%
Fundamentals of I/O benchmarking
11.04.2016
Home
»
Archive
»
2016
»
Issue 32: Measu...
»
needed to reposition the read head is eliminated. The admin can monitor merging of I/O blocks with iostat -
x
. This assumes the use of the filesystem cache. In Listing 2, wrqm/s stands for write requests
13%
CI/CD deliverables pipeline
07.06.2019
Home
»
Archive
»
2019
»
Issue 51: Self-...
»
-y 17 18 RUN apt-get install -y \ 19 autoconf \
20
automake \ 21 build-essential \
22
ca-certificates \ 23 cmake \ 24 curl \ 25 g++-7 \ 26 git \ 27 less \ 28
13%
The practical benefits of network namespaces
15.08.2016
Home
»
Archive
»
2016
»
Issue 34: Softw...
»
ns2 ip addr add 1.1.1.2/10 dev veth2 18 $ ip netns exec ns1 ip link set veth1 up 19 $ ip netns exec ns2 ip link set veth2 up
20
21 $ ip netns exec ns1 ping -c2 1.1.1.2
22
PING 1.1.1.2 (1.1.1.2) 56
13%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home
»
Archive
»
2013
»
Issue 14: Samba 4
»
, one-time passwords, or both. Certificate-based two-factor authentication typically uses digital PKI certificates based on the
X
.509 standard. These are typically stored on a hardware certificate storage
13%
Let the editor wars begin!
11.10.2016
Home
»
Archive
»
2016
»
Issue 35: Persi...
»
, interesting, and worthwhile exercise. I argue that systems administration needs a command-line editor, because it can be used even if
X
windows isn't working or isn't installed on the servers. Knowing how
13%
HPC Cloud Storage
20.11.2013
Home
»
HPC
»
Articles
»
_blocks.. ..symlink_targets.. ..names.. ..contents.. ..ext_attributes.. Compressing and uploading metadata... Wrote
0.00
MiB of compressed metadata. First, notice that I created the file as root. Second, the prefix
13%
Security data analytics and visualization with R
05.12.2014
Home
»
Archive
»
2014
»
Issue 24: Visua...
»
("(?i)