9%
27.09.2024
. In terms of costs, you can configure a lower maximum capacity for individual shares at a later date.
On the Advanced
tab, keep the default settings. TLS 1.2, the highest available minimum version
9%
30.01.2024
of a general architecture for distributed monitoring. Some systems such as Checkmk [5] or Zabbix [6] support this type of architecture by default. However, the emergence of distributed monitoring strategies
9%
03.04.2024
took the form of a context menu; from v1.2.x (used here) a separate tab has several subcategories. In the advanced settings, you can manage the authorizations for remote sessions in the Security
9%
28.11.2023
for the analysis of domains and the design of application-oriented software was filled by others. Popular methods include event storming [6], domain storytelling [7], or example mapping [8].
These methods have
9%
28.11.2023
the required detailed knowledge of the domain – not the developers. This point is exactly where the first tie to agility can be found. One of the 12 principles of the agile software development manifesto
9%
07.10.2025
, the priority that applies to events that match a specific rule in Falco must be defined.
From an admin's perspective, the fields for conditions, outputs [6], and priority are of particular interest. Listing 1
9%
31.10.2025
that management also take part in the meetings.
In a comic book style, "One Day in Kanban Land" [6] vividly illustrates how these stand-up meetings promote continual improvement and give all participants
9%
06.10.2022
this problem. File I/O can therefore be a highly relevant factor for program optimization. The libiotrace [4] library uses LD_PRELOAD to gather data about POSIX [5] and MPI [6] file I/O functions. Although other
9%
16.05.2013
to be invoked. [Bug 9651]
6. Windows clients complain that they cannot disable offline caching on the profile share [Bug 7810]. (This is a non-critical message and does not affect operation.)
Issues 2 and 3
9%
16.05.2013
authentication on the basis of text messages.
Zyxel [6], the Taiwanese network equipment manufacturer, has a two-factor authentication solution in its portfolio. It provides VPN access to the company's own Zy