Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1238)
  • Article (265)
  • News (87)
  • Blog post (7)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 5 6 7 8 9 10 11 12 13 14 15 16 17 18 ... 160 Next »

38%
macOS file recovery and security
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Sgursozlu, Fotolia.com
the data, wherein macOS creates one volume for the system and one for data. Both storage locations use the APFS filesystem. Users only have read permissions for the system volume, which does not impose any
38%
Failure to Scale
03.07.2013
Home »  HPC  »  Articles  » 
or processes are used, performance does not improve (wall clock time does not change). To better understand how Amdahl’s Law works, consider a theoretical application that is 80% parallelizable (20% serial
38%
Book Review: Land of Lisp
14.09.2011
Home »  Articles  » 
 
will call a thing of beauty. On the other hand, Lisp can also thwart seasoned professionals with a half-dozen languages under their belt -- and indeed, it does so in most cases, because it requires
38%
Vulnerability assessment best practices for enterprises
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Photo by Fancycrave on Unsplash
? Are the procedures and policies reviewed and updated (e.g., a risk assessment policy every five years, risk assessment procedures annually)? Does the organization develop, disseminate, and review or update
38%
Why Good Applications Don’t Scale
13.10.2020
Home »  HPC  »  Articles  » 
. The application takes 205 seconds. This is maddening! Why did the wall clock time go up? What’s going on? Gene Amdahl In essence, the wall clock time of an application does not scale with the number of cores
38%
Why Good Applications Don't Scale
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © man64, 123RF.com
is enough: Try all 64 cores. The application takes 205 seconds. This is maddening! Why did the wall clock time go up? What's going on? Gene Amdahl In essence, the wall clock time of an application does
38%
VDI Basics
03.09.2013
Home »  Articles  » 
 
, the user simply takes the reserve unit out of the cabinet, plugs it in, and carries on – the admin does not need to be there looking for mistakes and does not need to unscrew the case, restore data from
38%
Container orchestration with Kubernetes from Google
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Kirsty Pargeter, Fotolia.com
Hat as it does on Ubuntu. Docker is networked out of the box and is designed to manage containers. Kubernetes aims to extend Docker to add fleet capacity, so Google has introduced several technical ... Google created a special Linux distribution called Kubernetes to simplify life with Docker. ... Container orchestration with Kubernetes from Google
38%
Preparing to move to the cloud
02.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © mikdam, 123RF.com
If you believe the advertisements, it's easy to use the services of cloud providers like Amazon [1], Google [2], Microsoft [3], and others. At the same time, the marketing by these companies ... Because the cloud is ubiquitous, some companies think that outsourcing their business applications to Amazon, Google, and the like is a breeze. In fact, on the way, treacherous winds blow just off
38%
Avoiding KVM configuration errors
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © Dan Barbalata, 123RF.com
the application that uses these functions does not have to deal with all the details of the hardware. KVM and Qemu Any Linux application can use the KVM functions provided by the kernel, but in practice, only one

« Previous 1 ... 5 6 7 8 9 10 11 12 13 14 15 16 17 18 ... 160 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice