Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1263)
  • News (419)
  • Article (310)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 97 98 99 100 101 102 103 104 105 106 107 108 109 110 ... 200 Next »

12%
Load testing with Locust
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Damien TUPINIER on Unsplash
of the test to provide the required information for the users of your service. After the load test, check that the service is available again without errors and reset the TTL value. Preparing Locust Locust
12%
Post-Quantum Cryptography with TutaCrypt
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © pitinan, 123RF.com
-Hellman (ECDH) key exchange that provides strong security against classical adversaries. At the same time, the X25519 approach is highly efficient, requiring very short key sizes and computation times
12%
ASM tools and strategies for threat management
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © tarokichi, 123RF.com
Security analysts and providers use the term "attack surface management" (ASM) to describe tools and software-as-a-service (SaaS) offerings that are intended to enable enterprises – large corporations
12%
Managing Ubuntu with Canonical Landscape
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Kitsadakron Pongha, 123RF.com
can manage its field force's laptops via Landscape. When staff change devices or receive new ones from time to time, you would normally need to remove the obsolete devices manually from Landscape
12%
Parallel Python with Joblib
08.04.2014
Home »  HPC  »  Articles  » 
to 'all ' . However, if processing consumes a large amount of memory, a lower value provides an opportunity to save RAM. To do this, you can enter a positive integer. Convenient Multiprocessing Module
12%
The New Hadoop
17.07.2013
Home »  HPC  »  Articles  » 
individual job tasks, tracking progress, and providing fault tolerance for tasks. Similar to many HPC nodes, the TaskTracker is directed by the JobTracker and is responsible for launch and tear down of jobs
12%
Lua for Apache
10.07.2012
Home »  Articles  » 
 
_1 . Once you have Lua in place on your disk, you can turn to the Apache web server source code and run the provided configure with the additional --enable-lua parameter. Alternatively, you can append lua
12%
Neglected IPv6 Features
06.08.2012
Home »  Articles  » 
 
and target addresses are part of the link-local scope (fe80::/10 ), the transport protocol is IPv6. Since IPv6 is enabled and LLMNR provides name resolution, the pending messages are now also transported via
12%
Do You Know Juno?
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © alexskopje, 123RF.com
supported by several leading cloud providers. The OpenStack project [1] relies on a strict cycle. New releases appear in April and October no matter what the cost. To date, the release manager, Thierry Carrez
12%
Detect anomalies in metrics data
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © rudall30, 123RF.com
certain values or are outside of defined limits. The question of how use an existing Prometheus installation for effective anomaly detection is provided by Red Hat. The Prometheus Anomaly Detector (PAD

« Previous 1 ... 97 98 99 100 101 102 103 104 105 106 107 108 109 110 ... 200 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice