6%
25.03.2021
restart is required. When a certificate is renewed, an automatic restart with cronjob makes sense.
The mod_md module extends mod_status to include the md-status section, which means you get JSON output
6%
17.02.2015
.041GFLOPS for double-precision. This level of performance won't get a cluster of Raspberry Pi's on the TOP500 any time soon, but that's not the real point of the RPi. The point is to get fully featured
6%
09.08.2015
. The "Vivid Vervet" box describes how to compile the software for Ubuntu 15.04.
Vivid Vervet
You first need to install all required packages [5] to install Cockpit in Ubuntu 4.15:
sudo apt-get install
6%
04.12.2024
administrators are happy to see that export functions are available, at to least export the content to, for example, XML, so those who know how to use scripts will achieve quick and good results manually.
A pair
6%
14.03.2018
's configuration. This can't start with the installation of Python, because apt first has to get to know the upstream proxy; this again happens in raw mode here.
Listing 6
Internal VM Configuration
01
6%
30.11.2025
of the client request (both for POST and for GET), as well as the most important server environment details [6]. Additionally, you can use regular expressions. For example, to investigate an HTTP request to find
6%
20.03.2014
metadata into the configuration. Listing 2 shows the corresponding JSON data and how to load it into the configuration.
Listing 2
meta.json
01 # cat meta.json
02 {
03 "set
6%
18.08.2021
to test a simple example so I can get a feel for the postprocessing output. I grabbed an example from a previous article (Listing 1). Although this example doesn’t produce much I/O, I was curious to see
6%
05.08.2024
].
Figure 1: The IBM AIX collection is available for download from Ansible Galaxy.
Getting Started
The AIX collection [6] contains a large number of modules and roles to help you manage AIX
6%
22.05.2023
-us/windows-hardware/design/device-experiences/oem-secure-boot
Using TPM on Windows: https://learn.microsoft.com/en-us/windows/security/information-protection/tpm/how-windows-uses-the-tpm#tpm-in-windows
Root of trust for protecting Windows: https://learn.microsoft