search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%xcomm%3
?
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(414)
Article
(120)
News
(3)
Blog post
(1)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
47
48
49
50
51
52
53
54
57%
Six emergency CDs from antivirus manufacturers
02.08.2021
Home
»
Archive
»
2021
»
Issue 64: Bare...
»
both from an optical data carrier or from a USB memory stick. Start The system, based on Ubuntu
20
.04.1 and equipped with a fairly up to date 5.8 kernel, first boots into a graphical GRUB screen
56%
Parallel and Encrypted Compression
09.12.2021
Home
»
HPC
»
Articles
»
falls between the switch and the number of threads.) Both the compression and decompression capabilities should be multithreaded. pzstd The parallel version of zstd is pzstd . On my Ubuntu
20
.04 system, pzstd was
56%
Azure Sphere for Internet of Things
22.05.2023
Home
»
Archive
»
2023
»
Issue 75: Teamwork
»
not manufacture this kind of hardware but works with third-party suppliers that manufacture devices to spec. Several compatible devices from various manufacturers can be found on the market [
3
]. The core of all
56%
Windows Server 2012 Tricks
27.05.2013
Home
»
Articles
»
virtual servers. They use the individual virtual switches of the Hyper-V host as their basis. Trick
3
: Virtual Domain Controller – Cloning and Snapshots In Windows Server 2012, Microsoft has optimized
56%
Discovering indicators of compromise
05.02.2019
Home
»
Archive
»
2019
»
Issue 49: Anato...
»
to identify an essential principle of the security analyst: As an attack occurs, certain things are left behind. This concept was first articulated by Edmond Locard [
3
] almost 100 years ago, well before
56%
The 12 best tricks for Windows Server 2012
14.03.2013
Home
»
Archive
»
2013
»
Issue 13: IPv6...
»
virtual servers. They use the individual virtual switches of the Hyper-V host as their basis. Trick
3
Virtual Domain Controller -- Cloning and Snapshots In Windows Server 2012, Microsoft has optimized
56%
Vulnerability assessment best practices for enterprises
16.08.2018
Home
»
Archive
»
2018
»
Issue 46: CMS S...
»
). Figure 1: Articulated as a mathematical formula, Risk = Threat
x
Vulnerability
x
Cost of Asset. Clear Guidance VA activities must have acceptance from the highest levels of an organization
55%
Storage trends for taming the flood of data
27.09.2024
Home
»
Archive
»
2024
»
Issue 83: Storage
»
kernel, in the cross-platform
x
NVMe tools starting at version 0.7, in the free Qemu hardware simulator starting at version 8.0, and in nvme-cli, the NVMe command line. Further implementations are underway
« Previous
1
...
47
48
49
50
51
52
53
54