search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(12)
Article
(1)
Keywords
1
2
Next »
100%
Automating deployments on Proxmox with OpenTofu and cloud-init
04.12.2024
Home
»
Articles
»
Rubén
Llorente
... ). Listing
3
tofu_project/main.tf 01 terraform { 02 required_providers { 03 proxmox = { 04 source = "bpg/proxmox" 05 version = "
0.64.0
" 06 } 07 } 08 }
09
10 provider "proxmox
33%
Compressed Archives for User Projects
11.08.2025
Home
»
Articles
»
will use that in a bit. Listing 1: Check Directory Content $ ls -lstar total 62310 31150 drwxrwxr-x
0
laytonjb laytonjb 31897275 Dec 31 1969 DATA1 31152 -rw-rw-r-- 1 laytonjb laytonjb 31897275 Aug 2
09:52
30%
How vector databases work and when they're used
04.12.2024
Home
»
Archive
»
2024
»
Issue 84: Non-R...
»
_result = client.search(collection_name="test_collection", query_vector=[
0
.2,
0
.1,
0.9
,
0
.7], limit=
3
) print(search_result) ### Output: ScoredPoint(id=4, version=
0
, score=1.362, payload={"city": "New York"}, vector
29%
Storage across the network with iSCSI and Synology DiskStation Manager
04.12.2024
Home
»
Archive
»
2024
»
Issue 84: Non-R...
»
Attaching an iSCSI Device $ uname -a Linux DANSBOX 6.8.
0
-35-generic #35-Ubuntu SMP PREEMPT_DYNAMIC Mon May 20 15:51:
52
UTC 2024 x86_64 x86_64 x86_64 GNU/Linux $ lsblk NAME MAJ:MIN RM SIZE RO TYPE
29%
Identify malicious traffic with Maltrail
26.03.2025
Home
»
Archive
»
2025
»
Issue 86: Data...
»
with a small script that runs once a minute as a root cron job: #!/bin/bash ipset -q flush maltrail ipset -q create maltrail hash:net for ip in $(curl http://127.
0.0
.1:8338/fail2ban 2>/dev/null | grep -P '^[
0-9
29%
Tuning loops – from loop unrolling to Duff's device
28.07.2025
Home
»
Archive
»
2025
»
Issue 88: 5 Net...
»
[i] + b[i]; } When the number of cycles is known at compile time, a loop can be fully unrolled: c[
0
] = a[
0
] + b[
0
]; c[1] = a[1] + b[1]; c[2] = a[2] + b[2]; c[
3
] = a[
3
] + b[
3
]; However, it remains
28%
Web applications with Julia
26.01.2025
Home
»
Archive
»
2025
»
Issue 85: Monit...
»
program. Listing 5 Client for 01
02
Calculate intersections of
28%
Introducing the NoSQL MongoDB database
04.12.2024
Home
»
Archive
»
2024
»
Issue 84: Non-R...
»
; processes known as mongos route queries to the correct shard. The config server's metadata makes sure this happens. © MongoDB [
3
] Version 8.
0
of MongoDB introduced embedded config servers, which means
28%
Getting your virtual machine dimensions right
04.12.2024
Home
»
Archive
»
2024
»
Issue 84: Non-R...
»
increases. Figure 1 illustrates this for a two-socket system. Figure 1: A two-socket system (two NUMA nodes) showing local and remote RAM access from CPU
0
28%
Reducing the Attack Surface in Windows
04.12.2024
Home
»
Archive
»
2024
»
Issue 84: Non-R...
»
, signed drivers Yes 56a863a9-875e-4185-98a7 b882c64b5ce5 Stops Adobe Reader from creating child processes No 7674ba
52
-37eb-4a4f-a9a1-f
0
f9a1619a2c Stops all Office
1
2
Next »