search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(80)
Article
(25)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
2
3
4
5
6
7
8
9
10
11
Next »
17%
A Distributed SQL Database
03.08.2023
Home
»
Archive
»
2023
»
Issue 76: Energ...
»
, author, publication_date, price) VALUES ('1984', 'George Orwell', '1949-06-
08
', 14.99); SELECT * FROM books; As long as a majority of the replicas (in this case, at least two out of three) are operational
17%
Profiling application resource usage
14.03.2013
Home
»
Archive
»
2013
»
Issue 13: IPv6...
»
to 4.2GHz) 4
MB
L2 cache 384 Radeon cores 800MHz GPU clock speed DDR
3
1866MHz memory 100W Putting both the CPU and the GPU on the same processor allows the GPU to have access to system
17%
John the Ripper
22.08.2011
Home
»
Articles
»
:lanman passfile.txt Loaded 2 passwords with 2 different salts (FreeBSD MD5 [32/64]) guesses: 0 time: 1:04:04:
08
(
3
) c/s: 10927 trying: gmugoky - gmugok2 guesses: 0 time: 1:09:25:10 (
3
) c/s: 10929 trying
17%
Resource Management with Slurm
05.11.2018
Home
»
HPC
»
Articles
»
nodes, and make sure to do this as a user and not as root.
3
. To make life easier, use shared storage between the controller and the compute nodes. 4. Make sure the UIDs and GIDs are consistent
17%
Resource Management with Slurm
13.12.2018
Home
»
Archive
»
2018
»
Issue 48: Secur...
»
In previous articles, I examined some fundamental tools for HPC systems, including pdsh [1] (parallel shells), Lmod environment modules [2], and shared storage with NFS and SSHFS [
3
]. One remaining
17%
Machine learning and security
02.02.2021
Home
»
Archive
»
2021
»
Issue 61: Secur...
»
interacts with the environment as an agent, much like a sentient being (Figure
3
). The agent has to explore the environment and typically only learns after a certain number of actions whether
17%
Automate your VMware configuration with Puppet
11.04.2016
Home
»
Archive
»
2016
»
Issue 32: Measu...
»
are generating a test installation only. While the installation process is running, the Ubuntu host needs additional resources. Even though only
3
GB of RAM and two processor cores are required, the installation
17%
Profiling Python Code
09.12.2019
Home
»
HPC
»
Articles
»
hints, is written in C as a Python extension and comes in the standard Python
3
, which keeps the overhead low, so the profiler doesn’t affect the amount of time much. cProfile outputs a few stats about
16%
How to configure and use jailed processes in FreeBSD
14.03.2013
Home
»
Archive
»
2013
»
Issue 13: IPv6...
»
struct jail 01 main(int argc, char **argv) 02 { 03 struct jail j; 04 int i; 05 [...] 06 /* Populate the jail struct */ 07 memset(&j, 0, sizeof(j));
08
j.version = 0; 09 j.path =
16%
Detecting security threats with Apache Spot
14.03.2018
Home
»
Archive
»
2018
»
Issue 44: Cloud...
»
risks, quantifying possible data loss and responding to attacks. Apache Spot [
3
] uses big data and modern ML components to improve the detection and analysis of security problems. Apache Spot 1.0 has been
« Previous
1
2
3
4
5
6
7
8
9
10
11
Next »