search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(702)
Article
(211)
News
(103)
Blog post
(2)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
64
65
66
67
68
69
70
71
72
73
74
75
76
77
...
102
Next »
13%
New security features in Windows 10
11.02.2016
Home
»
Archive
»
2016
»
Issue 31: Tunin...
»
, but Microsoft assumes many manufacturers will provide biometric hardware solutions in the next
12
months. The situation already looks better for fingerprint sensors. All available solutions are supported
13%
Security with PowerShell 5
09.04.2019
Home
»
Archive
»
2019
»
Issue 50: Bpfilter
»
the importance of Windows Remote Management and remote server maintenance or cloud service management. Infos JEA Helper Tool: https://blogs.technet.microsoft.com/privatecloud/2015/
12
/20/introducing
13%
Verifying packages with Debian's ReproducibleBuilds
10.06.2015
Home
»
Archive
»
2015
»
Issue 27: Fault...
»
and understand the dependencies used in the snapshot archive package [
12
] if they are outdated. The experimental toolchain already works in a chrooted build environment, for example, with pbuilder [13]. Package
13%
Internet socket programming in Perl
06.10.2019
Home
»
Archive
»
2019
»
Issue 53: Secur...
»
->can_read($timeout); 11
12
foreach $socket (@ok_to_read) { 13 $socket->recv($data_buffer, $flags) 14 print $data_buffer; 15 } The script starts by declaring the IO::Select module for use. A new instance
13%
SDN and the future of networking
15.08.2016
Home
»
Archive
»
2016
»
Issue 34: Softw...
»
by the manufacturer was, and unfortunately still is, a painful experience. SDN has appeared in tandem with Network Function Virtualization (NFV) [
12
] for some time. Both technologies are high on the list of topics
13%
This Linux hardware company puts the emphasis on freedom and privacy
16.08.2018
Home
»
Archive
»
2018
»
Issue 46: CMS S...
»
Weaver. "Timing could also be a factor. Canonical managed to raise only $
12
million out of $32 million that they were asking for. At that time, it was not enough money because fabrication is expensive
13%
Meet the CTO of Red Hat
16.08.2018
Home
»
Archive
»
2018
»
Issue 46: CMS S...
»
to evolve and ended up working on the Linux kernel itself. Some
12
years ago when Red Hat was looking for virtualization expertise, he joined the company from Open Source Development Labs (OSDL). "Back then
13%
Container technology and work organization
13.06.2016
Home
»
Archive
»
2016
»
Issue 33: IPv6...
»
of vulnerabilities in container images is a good example. Projects such as Clair [11] and Nautilus [
12
] have only recently developed the capacity for detecting vulnerabilities in container images (Figure 1
13%
Admin as a service with sysstat for ex-post monitoring
01.06.2024
Home
»
Archive
»
2024
»
Issue 81: Load...
»
ALL 04 $ sar -f /var/log/sysstat/sa07 -s 23:30:00 -e 23:55:00 -P
1,2
However, filtering by specific days is often not enough, so you can filter for a time interval by passing -s [
13%
Provisioning resources with an Azure-specific language
03.04.2024
Home
»
Archive
»
2024
»
Issue 80: Threa...
»
: location 11 sku: {
12
name: 'Standard_LRS' 13 tier: 'Standard' 14 } 15 kind: 'StorageV2' 16 properties: { 17 accessTier: 'Hot' 18 } 19 } To add
« Previous
1
...
64
65
66
67
68
69
70
71
72
73
74
75
76
77
...
102
Next »