search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(551)
Article
(182)
News
(6)
Blog post
(3)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
55
56
57
58
59
60
61
62
63
64
65
66
67
68
...
75
Next »
23%
Capsicum – Additional seasoning for FreeBSD
09.01.2013
Home
»
Archive
»
2013
»
Issue 18: New W...
»
in a loop. Thus, the application can be switched to Capsicum capability mode with just two additional lines of program code: if (cap_enter() <
0
) error("cap_enter: %s",pcap_strerror(errno)); The following
23%
High-availability workshop: GFS with DRBD and Pacemaker
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
were delivered as part of the RHCS scope. Thus, up to RHCS 3.
0
, everything was fine if you wanted Pacemaker and GFS to cooperate. But Red Hat changed its policy in Red Hat Cluster Suite 3.1, deciding
23%
Managing the Build Environment with Environment Modules
06.11.2012
Home
»
HPC
»
Articles
»
using the avail option: $ module avail -------------------------- /opt/Modules/modulefiles ----------------------------- atlas/3.10.
0
/gnu4/i5-2400S modules blacs/1.1/gnu4/mpich2
23%
IAM for midmarket companies
28.11.2022
Home
»
Archive
»
2022
»
Issue 72: OpenS...
»
. Following the German KRITIS (critical infrastructure) revisions, the focus has also increasingly shifted to medium-sized companies, where working IAM has become practically mandatory. The topic of Industry 4.
0
23%
Optimizing Hyper-V network settings
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
Version 3.
0
of Hyper-V in Windows Server 8 offers several improvements in terms of networking that improve the system's performance. Examples include direct access by virtual machines to the network
23%
Real World AWS for Everyone
18.02.2018
Home
»
Archive
»
2018
»
Issue 43: Real...
»
]. Create access key pairs for the required tenants/users. An AWS access key always has a key ID in the form of AKIAJ4 PMEXHFYUHIXG2A and a secret access key such as :/ONT
0
HapjmLw7xni 6FPscmvPZJ Sc75hUXAQI+
N
3
23%
What is an IOPS Really?
24.02.2022
Home
»
HPC
»
Articles
»
MB
p s or Peak IOPS is x . However, what does “IOPS” really mean and how is it defined? Typically, an IOP is an I/O operation, wherein data is either read or written to the filesystem
23%
The 10 best tricks for taming Ansible
04.04.2023
Home
»
Archive
»
2023
»
Issue 74: The F...
»
the names of the system's network cards and, therefore, the counterpart to
n
7p1 on the workstation is ens7f
0
– not that there are seven network cards in the computer. Coulda, woulda, shoulda. The reality
23%
Detecting malware with Yara
09.10.2017
Home
»
Archive
»
2017
»
Issue 41: Kuber...
»
= "A pdf file that contains a bad link" 10 11 strings: 12 $pdf_magic = {68 47 77
22
} 13 $s_anchor_tag = "
0 and (#s
23%
Convert Linux shell commands into PowerShell cmdlets
07.04.2022
Home
»
Archive
»
2022
»
Issue 68: Autom...
»
Shell version. This two-pronged approach is also reflected in the system requirements: To create a package based on Crescendo, you need PowerShell version 7.
0
, whereas the modules will run in Windows PowerShell 5
« Previous
1
...
55
56
57
58
59
60
61
62
63
64
65
66
67
68
...
75
Next »