search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%xcomm%3 00s Llorente 48
?
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(69)
Article
(25)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
3
4
5
6
7
8
9
10
13%
Look for Bottlenecks with Open|SpeedShop
21.12.2011
Home
»
HPC
»
Articles
»
clock time = 46.156027 seconds cpu clock time = 46.160000 seconds Iterations = 7 Final Relative Residual Norm =
3
.535135e-07 [openss]: Converting raw data from /home/jeg/chaos_4_
x
86_64_ib
13%
Microsoft Exchange replacement
20.06.2022
Home
»
Archive
»
2022
»
Issue 69: Terra...
»
: It is not based on open standards, and it uses proprietary protocols and APIs like MAPI [
3
] for internal communication. Clients for Exchange are pre-installed on all Windows, Android, and Apple devices
13%
Discovering indicators of compromise
05.02.2019
Home
»
Archive
»
2019
»
Issue 49: Anato...
»
to identify an essential principle of the security analyst: As an attack occurs, certain things are left behind. This concept was first articulated by Edmond Locard [
3
] almost 100 years ago, well before
13%
Haskell framework for the web
22.12.2017
Home
»
Archive
»
2017
»
Issue 42: Secur...
»
Press [1], Drupal [2], or Joomla [
3
], generally they only have to unpack the core on the server and then add other modules. Installing security updates conscientiously and in good time counteracts ubiquitous
« Previous
1
...
3
4
5
6
7
8
9
10