search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(735)
Article
(234)
Blog post
(6)
News
(4)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
65
66
67
68
69
70
71
72
73
74
75
76
77
78
...
98
Next »
7%
HDF5 with Python and Fortran
21.03.2017
Home
»
HPC
»
Articles
»
. In this article. I want to give a quick introduction to HDF5 through some simple code examples. The goal is not to dive deep into HDF5 but to illustrate the basics of using
it
. I'll start with Python because
7%
Load testing with Locust
07.04.2022
Home
»
Archive
»
2022
»
Issue 68: Autom...
»
introduce you to Locust [1], a powerful tool that can simulate an incredibly large number of users. The Right
Time
Of course, you should not run a stress test against a production system, if possible
7%
Up close with SUSE Linux Enterprise 12
05.12.2014
Home
»
Archive
»
2014
»
Issue 24: Visua...
»
. As expected, all major server programs are available in sufficiently recent versions for enterprise systems. We took a tour of SLE 12 pre-release USB stick that arrived in our office just in
time
7%
Single sign-on with Keycloak
02.02.2021
Home
»
Archive
»
2021
»
Issue 61: Secur...
»
Single sign-on (SSO) offers many advantages, and SSO providers can provide valuable services in terms of user account security. Although
each
user only needs to remember one password to access
7%
OpenShift 3: Platform as a Service
13.06.2016
Home
»
Archive
»
2016
»
Issue 33: IPv6...
»
container. OpenShift's Variants Red Hat offers interested parties several options for using OpenShift.
Its
most simple variants are "gears" (Red Hat-speak for containers) in the public OpenShift cloud
7%
Microsoft Network Policy Server
02.06.2020
Home
»
Archive
»
2020
»
Issue 57: Artif...
»
logging options, but unfortunately no evaluation tools are available by default. This deficiency is remedied by numerous third-party tools that evaluate logs in
real
time
and offer graphical editing. One
7%
Parallel and Encrypted Compression
09.12.2021
Home
»
HPC
»
Articles
»
Interface (MPI) standard, so
it’s
parallel across distributed nodes. I will specifically call out this tool. The general approach for any of the multithreaded utilities is to break the file into chunks,
each
7%
Secure authentication with FIDO2
02.02.2021
Home
»
Archive
»
2021
»
Issue 61: Secur...
»
as a user, you first need to
go
through a registration process. During this process, you generate the cryptographic key material – a public and a private key – on a secure device known as the authenticator
7%
Asset tracking with RFID
07.06.2019
Home
»
Archive
»
2019
»
Issue 51: Self-...
»
for placing RFID tags: http://lowrysolutions.
com
/wp-content/uploads/2015/08/Lowry_
IT
_Asset_Tagging_Using_RFID_WP.pdf Oracle RFID products: https://www.oracle.
com
7%
Manipulation detection with AFICK
05.12.2019
Home
»
Archive
»
2019
»
Issue 54: NVMe...
»
_all.deb extension, and Debian users will want to
go
for the package with the shorter _all.deb file extension. In both cases, you import the package by typing: dpkg -i
On SUSE, openSUSE, Red Hat
« Previous
1
...
65
66
67
68
69
70
71
72
73
74
75
76
77
78
...
98
Next »