search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(1021)
News
(377)
Article
(291)
Blog post
(3)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
108
109
110
111
112
113
114
115
116
117
118
119
120
121
...
170
Next »
18%
Building an HPC Cluster
16.06.2015
Home
»
HPC
»
Articles
»
installation options are usually good enough. They install most everything you need. The next thing you need is a set of MPI libraries such as
Open
MPI or MPICH. These are the libraries you will use
18%
Let the Editor Wars Begin!
25.08.2016
Home
»
HPC
»
Articles
»
jumping into editor options, I want to put down the assumptions I'm using in my selection of what editors to write about. The starting assumptions are: The focus is on
open
source editors
18%
The practical benefits of network namespaces
15.08.2016
Home
»
Archive
»
2016
»
Issue 34: Softw...
»
). The namespaces API comprises three system calls – clone(2), unshare(2), and setns(2) – as well as a few /proc entries. Processes in user space
open
files with /proc/
/ns/ and use their file descriptors to stay
18%
Let the editor wars begin!
11.10.2016
Home
»
Archive
»
2016
»
Issue 35: Persi...
»
and Ground Rules Before jumping into editor options, I want to put down the assumptions I'm using in my selection of what editors to write about. The starting assumptions are: The focus is on
open
source
18%
Network backups with Amanda
05.12.2016
Home
»
Archive
»
2016
»
Issue 36: Autom...
»
encryption via
Open
SSH on request. This support for encryption through
Open
SSH means you can even back up systems in the DMZ without having to worry about eavesdropping. Current Amanda versions also support
18%
ZAP provides automated security tests in continuous integration pipelines
23.08.2017
Home
»
Archive
»
2017
»
Issue 41: Kuber...
»
Special Thanks: This article was made possible by support from Linux Professional Institute Commonly, a mixture of
open
source and expensive proprietary tools are shoehorned into a pipeline
18%
Container Apps
02.10.2017
Home
»
Articles
»
and operated. From a DevOps perspective, software deployments are no doubt possible considerably more often than before. Containers will not be based solely on Docker or rkt run times, though, because of the
Open
18%
Vulnerability assessment best practices for enterprises
16.08.2018
Home
»
Archive
»
2018
»
Issue 46: CMS S...
»
activity, construction mishaps (e.g., cut fiber optic lines), and other types of incidents. Vulnerabilities Vulnerabilities are often defined as
openings
or pathways that a given threat can exploit to do
18%
High-Performance Python 3
19.09.2019
Home
»
HPC
»
Articles
»
to run on GPUs is CuPy, an
open
source library of matrix functions for Nvidia CUDA that uses a number of CUDA libraries (e.g., cuBLAS, cuDNN, cuRAND, cuSOLVER, cuFFT, and NCCL) to get as much performance
18%
Secure cloud-native services with Prisma Cloud Compute
02.06.2020
Home
»
Archive
»
2020
»
Issue 57: Artif...
»
. Although Prisma Cloud Compute is not an
open
source product, I will point you at some
open
source code that might be useful in the container security niche. Once you've had a look at what's included
« Previous
1
...
108
109
110
111
112
113
114
115
116
117
118
119
120
121
...
170
Next »