search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%256mb 22!490 Llorente"22
?
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(450)
Article
(116)
News
(34)
Blog post
(3)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
54
55
56
57
58
59
60
61
9%
Identifying and using software licenses
27.05.2025
Home
»
Archive
»
2025
»
Issue 87: Light...
»
] to help you ensure that your project has correct licensing information. The project website (Figure 2) compares REUSE with other solutions [19], including ScanCode [20], ClearlyDefined [21], FOSSology [
22
9%
How graph databases work
04.08.2020
Home
»
Archive
»
2020
»
Issue 58: Graph...
»
21 # The name and age of the persons who know the person with ID 1:
22
gremlin> g.V(1).outE('knows').inV().valueMap('name', 'age') 23 ==>[name:[vadas],age:[27]] 24 ==>[name:[josh],age:[32]] 25 26
9%
Exploring PowerDNS
12.09.2013
Home
»
Archive
»
2013
»
Issue 16: Docker
»
rules in a rather simple fashion. For my example, I create the following uncomplicated firewall rules: sudo ufw enable primary:~$ufw logging on primary:~$ufw default deny primary:~$ufw allow
22
/tcp
« Previous
1
...
54
55
56
57
58
59
60
61