24%
20.03.2014
).
Figure 1: Some hotspots support a user-specific configuration with WPA Enterprise.
In most cases, the user database is not managed by the hotspot itself. Instead, the hotspot queries a RADIUS server
24%
20.03.2014
.
In the simplest case, it is now possible to embed Lua code directly in the configuration files using the content_by_lua keyword:
content_by_lua '
ngx.say("test")
';
Lua also handles request rewrites
24%
20.03.2014
a cloud. No matter how you design your configuration, Cloudify needs to operate through a master VM. In the case of a local cloud, the master VM runs on the local machine. Cloudify handles the complete
24%
20.05.2014
also sends email, text, or instant messages in the case of an incident. As the storage back end for the collected information, as well as for the configuration data of the monitored hosts, you can choose
24%
06.10.2019
without actually having to publish ports on the Internet. If neither ExpressRoute nor VPN are available, as might be the case in a test environment, enable remote access only as long as you need
24%
05.12.2016
the same variety of programs as Windows, but the exact opposite is the case. On Windows, neither an office suite nor a usable media player exists after installing the operating system – meanwhile, out
24%
09.06.2018
the state of a reaction. The benefits are obvious: The error case is described and documented. The subsequent actions can be created flexibly and are traceable. The cost of this architecture is a small
24%
16.08.2018
, too, the costs for hardware, operating system, and operating and management costs are added. Citrix provides a very good cost calculator [2] to help you compare costs for a business case.
The First
24%
15.08.2016
available for Android and iOS devices.
In addition to access via smartphones and tablets, you can evaluate data from a browser. In this case, communication between the end device and the SQL server occurs
24%
14.11.2013
from eth* for the NICs in your own udev rules, such as net0 or wan1. As is often the case in the open source world, alternatives to the persistent network rules have been developed by different parties