12%
21.08.2014
. This relationship can be illustrated in another way: For example, the time command, if called with the -v parameter or the format string %f, outputs a statistic that shows how often an application that it monitors
12%
29.08.2011
to support system virtualization in their article, "Formal Requirements for Virtualizable Third Generation Architectures." This landmark paper defined three properties for a virtual machine monitor (VMM
12%
20.08.2012
tool, a whitehat security tool, and a server or a client; it performs monitoring, supports tunnelling, and is a simple TCP proxy server on top of all that! Hard to believe, I realize, but in this article
12%
18.07.2013
email is more extensive than in Exchange and, above all, more stable.
Because IceWarp supports many features and standards, many system services are used that can be monitored and disabled separately
12%
12.09.2013
script for the class-based QoS (class-based queuing, CBQ).
/sbin/ifcfg – Replaces the IP address management option in ifconfig.
/sbin/rtmon – Enables monitoring of the routing table.
/sbin
12%
20.03.2014
the performance values of the current deployment and extract monitoring information. The web interface always runs on the management VM, which admins will most likely prefer to the Cloudify shell because it works
12%
17.02.2015
the developers, a role model already exists for a network in which the two endpoints can communicate anonymously with one another without being monitored: Tor.
The makers of DIME, led by Levison, described DIME
12%
11.04.2016
parameter set, I can monitor the action. If no problems occur, the output will look like Figure 2. The classes used are shown, along with their methods, and no errors were reported. However, I still don
12%
11.10.2016
, and similar selectors.
New Delays
The greatest changes are with the Deferred objects. They help manage, monitor, and execute multiple asynchronous tasks and, above all, make it easier to communicate
12%
13.02.2017
with Disconnect OMServer. If you only want to interrupt a session and resume it later on, you can read the Session Secret and then re-connect with it.
Within the session, you have access to a variety of monitoring