search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%xsede%3 000 Llorente"52
?
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(79)
Article
(2)
News
(1)
Keywords
« Previous
1
2
3
4
5
6
7
8
9
Next »
18%
Building more efficient database applications with a graph database
30.11.2025
Home
»
Archive
»
2012
»
Issue 08: FreeNAS
»
://neo4j.org http://www.sones.de/static-en/ http://www.infogrid.org http://www.hypergraphdb.org http://www.dekorte.com/projects/opensource/vertexdb/ License GPLv
3
18%
Debugging the Linux kernel with the Qemu emulator
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
qemu_x86_defconfigmake menuconfig (build-option, Kernel-Version
3
.2, gdb, tty1)makemake linux-menuconfig (debug info) make
3
. Compile the module and copy it to the root directory:cd driverexport CROSS
18%
Expand your sphere with a piece of Google
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
Amazon started converting its excess computational power to cash some time ago. Under such names as EC2 (Elastic Computing Cloud), S
3
(Simple Storage Service), and SimpleDB, the book and coffee
18%
Exploring the differences between MariaDB and MySQL
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
because, if you choose not to use it, there is no effect. All of the above features and others are described in greater detail in the MariaDB Knowledgebase [
3
]. Compatibility With MariaDB, every effort
18%
Effective honeypots with sensors on production systems
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
exploded in recent years. (From AV-TEST Institute [2], which registered more than 55,
000
malicious programs every day.) Although regular updates of signature databases used in virus scanners
18%
Remote desktop based on HTML5
31.10.2025
Home
»
Archive
»
2012
»
Issue 12: NAS S...
»
quickly view the password hash at the command line with the md5sum utility: # echo -n
| md5sum -t 319f4d26e
3
c536b5dd871bb2c
52
e3178 - Next, add this hash value instead of the password
18%
A simple approach to the OCFS2 cluster filesystem
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
filesystem (AFS) is another network filesystem that is available in a free implementation, OpenAFS [
3
]. On the other hand are cluster filesystems. Before computers can access "distributed" data, they first
18%
Script utilities in depth: grep, awk, and sed
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
. Here are some examples: _{
3
,} – Three or more consecutive underscores · {2,5} – Between two and five spaces in a row (where · is a space) (the·){2} – Two consecutive
18%
Warding off the rise of VoIP spam
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
of 480Kbps, which calls for a 512Kbps line. Assuming a line rental of EUR 30 (US$ 35-40), the basic rate for the marketer would be 0.004 cents per call. In other words, 5,
000
VoIP calls costs the same
18%
Introduction to OpenMP programming
31.10.2025
Home
»
Archive
»
2012
»
Issue 12: NAS S...
»
[
3
] to solving the questions. Although not the most efficient or fastest method for solving the problem, it does illustrate how one can use OpenMP to parallelize applications. I will be using
« Previous
1
2
3
4
5
6
7
8
9
Next »