15%
06.10.2019
, this is realized as a deep merge. In this way, standard configurations can easily be added to, and then be overwritten with, project-specific requirements, if necessary. The include statements also include remote
15%
11.10.2016
. The agent has to run on a separate host and then connects to the switches remotely to transfer a configuration. This is certainly not elegant, but it serves its purpose.
Puppetlabs and Juniper, at least so
15%
17.07.2018
by regeneration of the GitLab configuration and a restart.
Step 2: Activate Runner
Without at least one Runner, nothing works in GitLab. A Runner is something like a remote command receiver running on a system
15%
09.06.2018
passing generation. What started as a transport layer checksum, large send offload (LSO) and large receive offload (LRO) have evolved into the integration of well-known protocols, such as remote direct
15%
13.06.2016
components are taken into consideration at an early stage in the migration to IPv6:
Network firewalls
Application gateways
Proxies (HTTP/HTTPS, FTP, mail, etc.)
Remote access and VPN gateways
15%
15.08.2016
the remote ID and finally forwards the packet to the destination port.
Virtual switches do two things: They uphold strict separation between the underlay and overlay through encapsulation, and they use
15%
26.01.2025
to Prometheus as a client. Instead, the administrator configures a kind of internal Cortex load balancer, known as the Distributor, as a remote storage target in Prometheus. For some time now, Prometheus has
15%
26.01.2025
uses scripting to control the browser and the pages opened in it remotely. The test tool can record a user's mouse clicks and replay them later, which in turn significantly simplifies the process
15%
14.11.2013
and establishes a connection to an external Floodlight controller:
$ sudo mn --topo=minimal --controller=remote \
--ip= --port=
MiniNet immediately connects
15%
14.11.2013
it distributed the attack against Spamhaus over no fewer than 30,000 DNS resolvers using a remote-controlled botnet, none of the DNS server operators even noticed.
However, these examples do not exhaust