16%
16.08.2018
_NEUTRON_OVS_BRIDGE_MAPPINGS=physnet1:br-eth1,physnet0:br-ex
CONFIG_NEUTRON_OVS_BRIDGE_IFACES=br-eth1:eth1,br-ex:eth0
CONFIG_NEUTRON_OVS_BRIDGES_COMPUTE=br-eth1
CONFIG_PROVISION_DEMO=n
CONFIG_PROVISION_TEMPEST=n
Open
16%
22.02.2017
) }
DATA {
1, 2, 3, 4, 5, 6,
7, 8, 9, 10, 11, 12,
13, 14, 15, 16, 17, 18,
19, 20, 21, 22, 23, 24
}
}
}
}
HDF5 has many ways to represent the same datatype
16%
30.01.2020
specific CPUs with the use of features like sched_setaffinity() [6] or cgroups [7], which are both available in most Linux environments. However, such restrictions can also make scheduling even tougher
16%
04.10.2018
. For this tutorial, I use OpenShift Origin v3.6. For interested readers who don't have an OpenShift Origin cluster, you can instead use Minishift [10], a tool that runs a single-node OpenShift cluster locally inside
16%
05.12.2016
of the required results. You can thus automatically receive the required information via simple interfaces, such as the IP-to-ASN mapping service by Team Cymru [6], by regularly querying the assignment of an IP
16%
09.10.2013
boasted an impressive 291 million transistors, 10,034 times the original [2].
The first CPU to break the 3GHz barrier was an Intel Pentium 4 variant released in 2002, but disregarding unreliable
16%
08.10.2015
. The container cannot write to them, thus preventing privileged processes in containers from manipulating the host system.
The kernel breaks down root privileges into capabilities [6] and assigns capabilities
16%
11.02.2016
of all IT infrastructure money is now spent on the cloud. The Worldwide Quarterly Cloud IT Infrastructure Tracker says a total of $7.6 billion was spent in the third quarter of 2015. The total cloud
16%
03.04.2024
vulnerabilities that need to be addressed. (2) Osquery [5] is another host-based tool that queries and logs the system status. (3) Beats [6] uses Winlogbeat to monitor Windows-specific logs and files. Filebeat
16%
18.07.2013
. Finally, mandatory internal and external requirements, such as the Sarbanes-Oxley Act (SOX) [5], PCI-DSS [6], ISO 27001 [7], and Basel II [8], ensure technical and organizational compliance. Ultimately