13%
16.05.2013
BIOS computer name is restricted to a maximum length of 15 characters. NetBIOS is a network protocol used on Windows systems for name resolution and network communication and is mapped in Samba 3 by the nmbd
13%
17.06.2017
primarily on generating infrastructure components – that is, individual or whole clusters of VMs and associated networks and firewalls but also components such as virtualized load balancers and routers
13%
12.09.2013
CPUs), amount of virtual memory (vRAM), speed of the network connection (bandwidth), and contract duration. Thus, the vCloud Hybrid Service Dedicated Cloud provides physically isolated and reserved computing
13%
30.11.2025
Oracle's free VirtualBox virtualization solution is intended for use on the desktop. Management of virtual machines is via a GUI that only works locally and cannot be used on the network. Although
13%
27.05.2025
developers claim more than 300 supported monitoring targets, which does not even include the basic metrics of individual systems such as CPU and RAM utilization, I/O, network performance, and so on.
Basically
13%
14.08.2023
are connected to the corporate or university network by a virtual private network (VPN). VPNs allow you to connect to networks from virtually anywhere in the world if you have access to the Internet. (I
13%
02.02.2021
traditional rate-limiting approach, courtesy of advanced Linux networking and traffic control (tc), is investigated with the kernel's built-in Netfilter packet filter controlled by its iptables frontend
13%
15.08.2016
this option because they have little chance of losing data if the NFS server goes down or network connectivity is lost.
Asynchronous mode allows the server to reply to the NFS client as soon as it has
13%
09.01.2013
employees gives the topic a whole new dimension. A secure VPN access to the company's file server is possible in principle but not very practical on mobile devices. The current protocols and network
13%
30.11.2025
the ability to manage all network resources and user authentication centrally. To allow this to happen, all of the network resources – including users, groups, services, servers, workstations, shares