search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%256mb 22!490 Llorente"22
?
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(444)
Article
(116)
News
(34)
Blog post
(3)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
53
54
55
56
57
58
59
60
9%
High-availability workshop: GFS with DRBD and Pacemaker
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
17 18 19 20
21
22
23 This example also
9%
Using the Expect scripting environment
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
} 19 20 -re "($|%|>) " { interact } 21
22
timeout { 23 send_tty "No response from $host\n" 24 exit 25 } 26 } The script begins as usual by saving its arguments into variables
9%
Configuration management with Chef
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
18 validation_client_name "validator" 19 validation_key "/etc/chef/validation.pem" 20 client_key "/etc/chef/client.pem" 21 web_ui_client_name "chef-webui"
22
web
9%
Avoiding common mistakes in high-performance computing
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
16 into offset hole
22
, your new furniture might never live up to your expectations. Additionally, integrating the furniture into an existing room could be a challenge. Forgetting that the new surround
9%
Julia: A new language for technical computing
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
.33 164.69 0.75 rand_mat_stat 3.37 39.34 11.64 54.54
22
.07 8.12 rand_mat_mul 1.00 1.18 0.70 1.65 8
9%
How graph databases work
04.08.2020
Home
»
Archive
»
2020
»
Issue 58: Graph...
»
21 # The name and age of the persons who know the person with ID 1:
22
gremlin> g.V(1).outE('knows').inV().valueMap('name', 'age') 23 ==>[name:[vadas],age:[27]] 24 ==>[name:[josh],age:[32]] 25 26
9%
Exploring PowerDNS
12.09.2013
Home
»
Archive
»
2013
»
Issue 16: Docker
»
rules in a rather simple fashion. For my example, I create the following uncomplicated firewall rules: sudo ufw enable primary:~$ufw logging on primary:~$ufw default deny primary:~$ufw allow
22
/tcp
« Previous
1
...
53
54
55
56
57
58
59
60