100%
21.08.2014
these base images "boxes." Prebuilt boxes can be downloaded free of charge via the community collection on Vagrantbox.es [3] (Figure 1) or from the Vagrant Cloud powered by HashiCorp [4]. The latter provides ... 22
99%
21.08.2014
MIPS : 1993.93
17 processor : 2
18 BogoMIPS : 1993.93
19 processor : 3
20 BogoMIPS : 1993.93
21 Features : swp half thumb fastmult vfp edsp neon vfpv3 tls
22 CPU implementer : 0 ... 22
72%
21.08.2014
a speed of 100Mbps, the cost for each port is 19, as shown in Table 1. The only exception is the port channel between Switch 3 and Switch 4, which offers a total of 200Mbps and therefore has a cost value ... 22
71%
21.08.2014
,notify_24h_24x7
08 }
This article assumes you have some background with Nagios configuration, but I'll start with a little refresher for those who haven't tried it in a while. Nagios lets you define ... 22
71%
21.08.2014
.libvirt.unix.manage" || action.id == "org.libvirt.unix.monitor") && subject.isInGroup("virt")) {
07 return polkit.Result.YES;
08 }
09 return null;
10 });
After ensuring that the user virtuser is a member of the virt ... 22
70%
21.08.2014
application then grabs the data from this database and creates charts. The client can be programmed by the user or it can come as a prepared daemon (e.g., collectd [3]). If you like to measure your own ... 22
70%
21.08.2014
for use as a backup or rescue system.
Redo Backup is immediately ready for use after burning the 250MB image file to CD. To back up virtual machines, you can also integrate it directly as a virtual CD ... 22
70%
21.08.2014
.13.
Kpatch on Fedora
On Fedora 20, you first need to install some additional packages. The following instructions assume that all packages are up to date across the system. The kernel I used was version 3.14.3-200 ... 22
70%
21.08.2014
simulates a lottery with 100 tickets. Each ticket contains the name of a 100MB test file. In total, there are 10 different, equally large test files (called a to j ), but they occur a different number ... 22
70%
21.08.2014
report [3] said weak passwords contributed to 31% of compromises investigated.
Without picking on any one organization, choose a company, a social network, and a cloud provider; now, look up ... 22