search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
04090 Llorente"5432
?
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(65)
News
(1)
Keywords
« Previous
1
2
3
4
5
6
7
32%
Performance monitoring in Windows Server 2008 R2
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
, reduce the size of the swap file for drive C: to
0
. Click on Set to store the changes, close any open windows, and reboot your server. On a core server, the best approach to moving the swap file
32%
Warding off the rise of VoIP spam
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
10 seconds to complete, each call will cost the marketer
0
.06 cents in line rental and 20 cents per charge unit. Although this might not seem like a large expense, the relative ineffectiveness of spam ...
0
32%
A standard cloud computing API
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
another could allow the user to set up memory of between 1 and 8GB in increments of 512
MB
. The Deltacloud API bundles all these possibilities into hardware profiles, which means the clients are provided
32%
Create your own turnkey solutions
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
you'll need to make executable: chmod +x bitnami-trac-
0
.11.6-1-linux-installer.bin The filename will probably be different, but you get the idea. Another advantage to BitNami Installers is that you ...
0
32%
Configuring XP Mode in Windows 7
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
with a name like WindowsXPMode_en-us.exe. The executable file weighs in at around 470
MB
, which is understandable because it contains a complete XP image: Expect some installation mileage. You also might need
31%
ASM tools and strategies for threat management
26.01.2025
Home
»
Archive
»
2025
»
Issue 85: Monit...
»
on those attack surfaces that a professional attacker would tend to exploit. IBM refers to a Forrester survey, according to which users of the IBM Randori tool require
90
percent less time for vulnerability
« Previous
1
2
3
4
5
6
7