16%
16.05.2013
authentication on the basis of text messages.
Zyxel [6], the Taiwanese network equipment manufacturer, has a two-factor authentication solution in its portfolio. It provides VPN access to the company's own Zy
16%
20.03.2014
the modules and their Gluster-integration on the OpenStack website http://6.
Thanks to all these features, Gluster acts as a storage jack-of-all-trades for OpenStack with direct access to the major components
16%
07.10.2025
in which security and data integrity are paramount, especially when it comes to information with EU-RESTRICTED and NATO-RESTRICTED information [6].
Provisioning Keys in the WKD
A Web Key Directory (WKD
16%
01.08.2019
frameworks as DIY plugins. On the same principle, Karma plugins support continuous integration with Jenkins [5], Travis [6], or Semaphore [7].
After launching, Karma first loads all the plugins and parses its
16%
30.01.2024
and assigning tasks to the build nodes.
Another important component of the build system is Pulp [6], which provides artifact storage for newly-built packages and other products of the build process. According
16%
27.09.2021
password t0ps3cr3t
06 neighbor 192.0.2.1 peer-group LAB
07 ...
08 address-family ipv4 unicast network 192.168.1.1/32
09 exit-address-family
10 #FRR2
11 router bgp 65541
12 neighbor LAB peer
16%
12.03.2015
).
Benchmark results are usually expressed in terms of how much (wall clock) time it takes to run and in GFLOPS (10^9 floating point operations per second) or MFLOPS (10^6 floating point operations per second
16%
10.04.2015
).
Benchmark results are usually expressed in terms of how much (wall clock) time it takes to run and in GFLOPS (10^9 floating point operations per second) or MFLOPS (10^6 floating point operations per second
16%
02.06.2020
Despite, or perhaps because of, research successes in artificial intelligence (AI), powerful AI seems to be further away today than it was 10 years ago. Will AI ever step toward automated super
16%
03.08.2023
-password
If your private repository uses SSH keys for authentication, you can provide the SSH private key in the Secret instead of a username and password (Listing 6). The url field specifies the SSH URL