Canonical certifies Ubuntu 9.04 Server Edition on latest HP ProLiant servers


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) Canonical certifies Ubuntu 9.04 Server Edition on latest HP ProLiant servers
# 1  
Old 06-17-2009
Canonical certifies Ubuntu 9.04 Server Edition on latest HP ProLiant servers

Canonical certifies Ubuntu9.04 Server Edition on latest HP ProLiant servers

Canonical collaborateswith HP to deliver a high-performance, energy-efficientinfrastructure for Ubuntu customers

read more



More...
Login or Register to Ask a Question

Previous Thread | Next Thread
Login or Register to Ask a Question
CURLMOPT_PIPELINING_SERVER_BL(3)			     curl_multi_setopt options				  CURLMOPT_PIPELINING_SERVER_BL(3)

NAME
CURLMOPT_PIPELINING_SERVER_BL - pipelining server blacklist SYNOPSIS
#include <curl/curl.h> CURLMcode curl_multi_setopt(CURLM *handle, CURLMOPT_PIPELINING_SERVER_BL, char **servers); DESCRIPTION
Pass a servers array of char *, ending with a NULL entry. This is a list of server types prefixes (in the Server: HTTP header) that are blacklisted from pipelining, i.e server types that are known to not support HTTP pipelining. The array is copied by libcurl. Note that the comparison matches if the Server: header begins with the string in the blacklist, i.e "Server: Ninja 1.2.3" and "Server: Ninja 1.4.0" can both be blacklisted by having "Ninja" in the backlist. Pass a NULL pointer to clear the blacklist. DEFAULT
The default value is NULL, which means that there is no blacklist. PROTOCOLS
EXAMPLE
server_blacklist[] = { "Microsoft-IIS/6.0", "nginx/0.8.54", NULL }; curl_multi_setopt(m, CURLMOPT_PIPELINING_SERVER_BL, server_blacklist); AVAILABILITY
Added in 7.30.0 RETURN VALUE
Returns CURLM_OK if the option is supported, and CURLM_UNKNOWN_OPTION if not. SEE ALSO
CURLMOPT_PIPELINING(3), CURLMOPT_PIPELINING_SITE_BL(3), libcurl 7.54.0 February 03, 2016 CURLMOPT_PIPELINING_SERVER_BL(3)