Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xsede%3 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1281)
  • Article (341)
  • News (200)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 95 96 97 98 99 100 101 102 103 104 105 106 107 108 ... 183 Next »

13%
The Lua scripting language
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Nataliya Velykanova, 123RF.com
SWITCH VoIP software, the Redis NoSQL database, the Apache web server [3], and the Nginx reverse proxy service (see the OpenResty article in this issue). Homegrown Lua was developed at the Catholic
13%
Managing Linux Memory
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © J.R. Bale, 123RF.com
systems, distinguishes between virtual memory, which the operating system and applications see, and physical memory, which is provided by the hardware of the machine, the virtualizer, or both [2] [3]. Both
13%
Microsoft PowerToys for Windows 10
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Photo by Kenney Badboy on Unsplash
as an open source project. The source code and tools are available on GitHub [1]. Installation can be done several ways by either downloading the PowerToysSetup.msi installation file [2] or with Chocolatey [3
13%
Elephant Shed PostgreSQL appliance
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © victor zastolskiy, 123RF.com
a database server. Among other things, you can use it for fine-tuning, to monitor its vitals, and to design and execute a backup strategy. The appliance uses Prometheus [2] and Grafana [3] to collect
13%
Thread processing in Python
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Christos Georghiou, 123RF.com
around the GIL is to run computationally intensive code outside of Python with tools such as Cython [1] and ctypes [2]. You can even use F2PY [3] with compiled C functions. All of the previously mentioned
13%
Retention labels in Office 365
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © stokkete, 123RF.com
Office 365 plans, not all features are supported by all plans [2]. Most of the functions I will look at here are available starting in enterprise plan E3, but some of them start from E5. Microsoft
13%
News for Admins
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
 
such as WordPress, Drupal, and TYPO3" (https://thehackernews.com/2019/09/php-programming-language.html). Out of all these vulnerabilities, the most critical one was found in the Oniguruma library that comes
13%
Automation with System Center 2012 R2 Orchestrator
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © skaisbon, photocase.com
-bit application. Microsoft Internet Information Services (IIS) are required. The SCO setup enables the necessary IIS components, if they are not installed. Microsoft .NET Framework 3.5 SP1
13%
Windows security with public key infrastructures
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © vlue, 123RF.com
as credentials (Figure 3); these can be classic smart cards in the form of a USB stick or a virtual smart card [2]. Windows 8 was the first operating system to support the creation of virtual smart cards that act
13%
Proactive Monitoring
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Tom Wang, 123RF.com
. The problem is well known [3] and should be fixed in the next release. Because the index resides in volatile memory, stopping and then restarting is not a good idea. As an interim solution, you can send kill

« Previous 1 ... 95 96 97 98 99 100 101 102 103 104 105 106 107 108 ... 183 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice