19%
21.08.2014
=TSM
HP Data Protector
BACKUP=DP
Symantec NetBackup
BACKUP=NBU
Duplicity/Duply
BACKUP=DUPLICITY (still experimental)
CommVault Galaxy 5, 6 and 7
BACKUP
19%
17.06.2017
One important reason for the success of MySQL [1] is asynchronous replication, introduced in the 2001 release 3.23, which allows admins to set up replica instances (slaves) that receive all data
19%
29.09.2020
storage by splitting up these files and putting them back together again later. When the user uploads a file to RADOS, the client breaks it down into several 4MB objects before uploading, which RADOS
19%
26.01.2025
need an option to log in to remote systems (see the "Immutable IT" box). Talos Linux occupies less than 90MB when installed, compared with Ubuntu, which hogs almost 2GB in a minimal installation (Figure ... takes the game to the extreme and offers a system for Kubernetes that weighs in at less than 90MB.
19%
07.04.2022
\\Documents\PowerShell\Modules\Microsoft.PowerShell.Crescendo\0.6.1\Samples folder with some sample files intended for Unix-style commands.
Executing Commands
The most common use of Crescendo-generated wrappers is to wrap command-line commands in verb
19%
03.04.2024
credentials. the initializer can take up to 3 minutes to run
08 # use docker-compose logs -f initializer to track progress
09 docker-compose logs initializer ? grep "Admin password:"
First, run
19%
09.10.2013
boasted an impressive 291 million transistors, 10,034 times the original [2].
The first CPU to break the 3GHz barrier was an Intel Pentium 4 variant released in 2002, but disregarding unreliable
19%
15.11.2019
_foo.cpp
A recommended workflow for using hipify-perl is as follows:
1. Run the hipify-perl script on the CUDA source code.
2. Check the resulting HIP code into your preferred version control system.
3. Build the code
19%
06.10.2022
_PRELOAD, as well.
libiotrace: Just Another Profiling Tool?
A typical CPU computes data faster than data can be fetched from or stored to main memory (the so-called memory wall) [3]. Storage only exacerbates
19%
05.02.2023
as "deprecated."
Stubborn
Despite NIST's recommendation to discontinue SHA-1 and despite the availability of a secure successor in the SHA-2 and, later, the SHA-3 family, SHA-1 continued to be used virtually