search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%220mb%2222%A9n Llorente"523
?
Refine your search
[x]
Creation time
: Last three months
Sort order
Date
Score
Content type
Article (Print)
(74)
Article
(1)
Keywords
« Previous
1
2
3
4
5
6
7
8
44%
Clustering with OpenAIS and Corosync
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
vote is needed to calculate the quorum. When clusters have more than two nodes, at least half the votes from the existing cluster nodes plus one are needed (
n
/
2
+1). A two-node cluster is thus
44%
vSphere 5 vs. XenServer 6
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
[
2
] by VMware started to move into the server racks in the summer of 2011, but while I was researching this article, Citrix suddenly burst onto the scene with the XenServer 6.0 release [3
44%
I/O benchmarks with Fio
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
tests and take some of the load off the SSD with the fstrim command from a recent util-linux package [
9
]. The workload from Listing 3, which measures the IOPS with a variable block size between
2
Kb
44%
Professional backup solutions compared
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
As of kernel
2
.4.x As of kernel
2.2
.x Asianux/Red Flag, CentOS, Debian, Novell OES, Red Hat, SUSE, Ubuntu BSD – FreeBSD, NetBSD, OpenBSD No No Free ...
2
44%
Finding cracks with Nmap, Portbunny, and Nessus
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
problems with Nessus. Any discussion of security scanning and packet filtering requires some basic knowledge of network ports and Transport Layer protocols [1] [
2
]. For additional background on these topics
« Previous
1
2
3
4
5
6
7
8