search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%220mb 12 00s Llorente"22
?
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(399)
Article
(115)
News
(20)
Blog post
(3)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
47
48
49
50
51
52
53
54
9%
GlusterFS Storage Pools
17.11.2016
Home
»
HPC
»
Articles
»
the trusted storage pool, you simply add additional servers to the existing federation. The example here is based on Fedora
22
and is designed to provide back-end storage for virtual systems based on Qemu
9%
Hyper-V with the SMB 3 protocol
11.06.2014
Home
»
Archive
»
2014
»
Issue 21: Manag...
»
into Windows in the mid-1990
s
via LAN Manager. Microsoft modified SMB 1.0 and submitted it to the Internet Engineering Task Force (IETF), and SMB was renamed to CIFS (Common Internet File System). Microsoft
9%
Arm yourself against cloud attacks
06.10.2019
Home
»
Archive
»
2019
»
Issue 53: Secur...
»
rules still apply. The attacker cannot open port
22
to the outside by deleting the corresponding Netfilter rule to gain access to the system by SSH. How security groups can be used in AWS is explained
9%
Build storage pools with GlusterFS
15.08.2016
Home
»
Archive
»
2016
»
Issue 34: Softw...
»
the trusted storage pool, you simply add additional servers to the existing federation. The example here is based on Fedora
22
and is designed to provide back-end storage for virtual systems based on Qemu
9%
How vector databases work and when they're used
04.12.2024
Home
»
Archive
»
2024
»
Issue 84: Non-R...
»
as a service (Saa
S
) tool, such as the co.embed API [5], to create the embeddings. Using Vector Databases The challenge with vector searches begins with identifying similar documents in a very large set
9%
Intrusion Detection with OSSEC
30.01.2024
Home
»
Archive
»
2024
»
Issue 79: Monit...
»
attacks such as port scans, connection breaches, and distributed denial-of-service (DDo
S
) attacks. In this article, I show you how to set up the server and the clients. You can also set up OSSEC
9%
HPCCM with Docker and Podman
09.09.2024
Home
»
HPC
»
Articles
»
to maintain than a long specification file, and because it’
s
Python, you can use any Python code or tools as part of the recipe. The recipe uses “building blocks” for capabilities such as compilers, libraries
« Previous
1
...
47
48
49
50
51
52
53
54