36%
04.12.2024
hierarchically:
scm:
name:"Github"
User: "user01"
url: "https://www.github.com"
The playbook then accesses variables like {{ scm.url }}, which means you can easily see the sub-section to which
36%
30.11.2020
CPUs, 2GB of RAM, and 5GB of disk space. Depending on the number of active users, the RAM requirement can increase to 16GB.
In Real Time
Kopano relies on the software stack from Zarafa, which became
36%
30.11.2020
, push, and sign images.
Skopeo
Copy, remove, inspect, or sign images.
Red Hat resources [5] [6] can help you understand fully how CRI-O is used within Kubernetes and Open
36%
22.12.2017
malware threats.
Quite a few reasons speak to the use of exotic frameworks such as the Haskell-based Yesod [4] [5]. It is not just that Yesod is less widespread, it is also that the security built
36%
09.08.2015
://oxpedia.org
Scalix: http://www.scalix.com
Scalix 12.5: http://www.scalix.com/main/37-english/support/400-scalix-12-5-release-notes
Tine 2.0: https://www.tine20.org
Zarafa: http://www.zarafa.com
Zarafa
36%
11.06.2014
system, you might be better served with a combination of Apache OFBiz and Magnolia CMS instead of opentaps.
ERP5
URL: http://erp5.com
Strengths:
Unique ERP workflow options
Mature
36%
25.03.2020
key-value store etcd [5] with a teeny, tiny SQLite3 database module to act as the storage component. For context, the not-so-new Android smartphone on which I am writing this article uses an SQLite
36%
04.08.2020
(minified by 25.99X)
from python:2.7-alpine - 84.3MB => 23.1MB (minified by 3.65X)
from python:2.7.15 - 916MB => 27.5MB (minified by 33.29X)
from centos:7 - 647MB => 23MB (minified by 28.57X)
from centos
36%
11.10.2016
(every 5 seconds):
14 (periodically-expire 5)
15
16 ; Email address used to send notifications:
17 (def email (mailer {:from "riemann@example.com"}))
18
19 ; Index: Definition
20 (let [index (index)]
21
36%
25.09.2023
multiple ARP replies posing as the target machine and convince the originator of the connection to create a connection with it instead of the correct computer. This deceit is known as ARP spoofing [5