search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(588)
Article
(169)
News
(101)
Blog post
(1)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
48
49
50
51
52
53
54
55
56
57
58
59
60
61
...
86
Next »
10%
Verifying packages with Debian's ReproducibleBuilds
10.06.2015
Home
»
Archive
»
2015
»
Issue 27: Fault...
»
and understand the dependencies used in the snapshot archive package [
12
] if they are outdated. The experimental toolchain already works in a chrooted build environment, for example, with pbuilder [13]. Package
10%
Internet socket programming in Perl
06.10.2019
Home
»
Archive
»
2019
»
Issue 53: Secur...
»
->can_read($timeout); 11
12
foreach $socket (@ok_to_read) { 13 $socket->recv($data_buffer, $flags) 14 print $data_buffer; 15 } The script starts by declaring the IO::Select module for use. A new instance
10%
SDN and the future of networking
15.08.2016
Home
»
Archive
»
2016
»
Issue 34: Softw...
»
by the manufacturer was, and unfortunately still is, a painful experience. SDN has appeared in tandem with Network Function Virtualization (NFV) [
12
] for some time. Both technologies are high on the list of topics
10%
This Linux hardware company puts the emphasis on freedom and privacy
16.08.2018
Home
»
Archive
»
2018
»
Issue 46: CMS S...
»
Weaver. "Timing could also be a factor. Canonical managed to raise only $
12
million out of $32 million that they were asking for. At that time, it was not enough money because fabrication is expensive
10%
Meet the CTO of Red Hat
16.08.2018
Home
»
Archive
»
2018
»
Issue 46: CMS S...
»
to evolve and ended up working on the Linux kernel itself. Some
12
years ago when Red Hat was looking for virtualization expertise, he joined the company from Open Source Development Labs (OSDL). "Back then
10%
Container technology and work organization
13.06.2016
Home
»
Archive
»
2016
»
Issue 33: IPv6...
»
of vulnerabilities in container images is a good example. Projects such as Clair [11] and Nautilus [
12
] have only recently developed the capacity for detecting vulnerabilities in container images (Figure 1
10%
Admin as a service with sysstat for ex-post monitoring
01.06.2024
Home
»
Archive
»
2024
»
Issue 81: Load...
»
ALL 04 $ sar -f /var/log/sysstat/sa07 -s 23:30:00 -e 23:55:00 -P
1,2
However, filtering by specific days is often not enough, so you can filter for a time interval by passing -s [
10%
Provisioning resources with an Azure-specific language
03.04.2024
Home
»
Archive
»
2024
»
Issue 80: Threa...
»
: location 11 sku: {
12
name: 'Standard_LRS' 13 tier: 'Standard' 14 } 15 kind: 'StorageV2' 16 properties: { 17 accessTier: 'Hot' 18 } 19 } To add
10%
Web applications with Flask
14.03.2013
Home
»
Archive
»
2013
»
Issue 13: IPv6...
»
rel="stylesheet" href="style.css" /> 05 {% endblock %} 06 07 08
09 {% for item in seq %} 10
{{ item }}
11 {% endfor %}
12
13 14