search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%xcomm%3&00 Llorente 22
?
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(47)
Article
(30)
Blog post
(1)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
2
3
4
5
6
7
8
15%
Comparing Ceph and GlusterFS
21.04.2015
Home
»
Archive
»
2014
»
Issue 23: 10 Ti...
»
-r--r-- 2 root root 6
3
. Feb 18:36 .glusterfs/0d/19/0d19fa
3
e-5413-4f6e-abfa-1f344b687ba7 # # ls -alid dir1 .glusterfs/fe/9d/fe9d750b-c0e
3
-42ba-b2cb-
22
ff8de
3
edf0 .glusterfs /
00/00
15%
How to configure and use jailed processes in FreeBSD
14.03.2013
Home
»
Archive
»
2013
»
Issue 13: IPv6...
»
(pr->pr_path), 0); 17 [...] 18 error = copyinstr(j.hostname, 19 &pr->pr_host, sizeof(pr->pr_host), 0);
20
[...] 21 pr->pr_ip = j.ip_number;
22
pr->pr_linux = NULL; 23 pr->pr_securelevel = securelevel
15%
Where does job output go?
28.11.2023
Home
»
Archive
»
2023
»
Issue 78: Domai...
»
to little NVMe drives that are only a few millimeters thick and very short. The M.2 SSDs are approximately
22
mm
wide and 60-80
mm
long. It became obvious that putting a fair number of SSDs that are very fast
15%
Nine home clouds compared
05.12.2014
Home
»
Archive
»
2014
»
Issue 24: Visua...
»
.21 – EUR5.95 EUR1.
00
(with French VAT) EUR2.78 (half price as of year two) – $2.92 License(s) AGPL, commercial GPL, LGPL, AGPL Commercial GPLv
3
15%
Protecting your web application infrastructure with the Nginx Naxsi firewall
18.07.2013
Home
»
Archive
»
2013
»
Issue 15: What’...
»
proxy_intercept_errors on; 17 ... 18 Filming location 19 ...
20
error_page 502 @ fallback; 21 proxy_next_upstream HTTP_500 http_502 http_503 http_504 timeout error invalid_header;
22
proxy_pass http
15%
Wireshark
27.11.2011
Home
»
Articles
»
needs direct access to the hardware and thus typically runs with root privileges. The exceptions are Mac OS
X
and Solaris, where the user only needs access privileges for the network interface card device
15%
Moving HPC to the Cloud
19.10.2012
Home
»
HPC
»
Articles
»
is US$
3
.1/hour. Thus, using the small usage case (80 cores, 4GB of RAM per core, and basic storage of 500GB) would cost US$ 24.
00
/hour (10 Eight Extra Large Instances). The larger usage case (256 cores
15%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home
»
Archive
»
2013
»
Issue 14: Samba 4
»
, one-time passwords, or both. Certificate-based two-factor authentication typically uses digital PKI certificates based on the
X
.509 standard. These are typically stored on a hardware certificate storage
« Previous
1
2
3
4
5
6
7
8