Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1238)
  • Article (265)
  • News (87)
  • Blog post (7)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 109 110 111 112 113 114 115 116 117 118 119 120 121 122 ... 160 Next »

38%
Darshan I/O analysis for Deep Learning frameworks
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Michaela Murphy on Unsplash
the provided wrappers (Perl scripts) to create an instrumented binary. Darshan uses the MPI profiling interface of MPI applications for gathering information about I/O patterns. It does this by "… injecting
38%
Open source monitoring with Zabbix
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Vincentiu Solomon on Unsplash
-volume write access, because Zabbix stores all collected data in various database tables. A mechanism ensures that the data does not expand uncontrollably. In a larger monitoring environment, the Zabbix database
38%
Setting up HTTP/2 for Nginx
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Ludomil Sawicki on Unsplash
_requests directive specifies the maximum number of requests that can be processed over a given TCP connection. Again, it parallels HTTP/1.1 (keepalive_requests), and again the default values (100 vs. 1,000) show
38%
Secure access to Kubernetes
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Zachery Blanton, 123RF.com
of OAuth 2.0 [3] that Microsoft and Google offer in their public clouds. The service distributes tokens that prove to be more up to date and which Kubernetes accepts, assuming you have done the prep work
38%
Aggregating information with Huginn
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © it Ilka Burckhardt, Fotolia.com
://cache.ruby-lang.org/pub/ruby/2.3/ruby-2.3.4.tar.bz2 | tar xj cd ruby-2.3.4 ./configure --disable-install-rdoc make -j`nproc` sudo make install sudo gem install rake bundler foreman --no-ri --no-rdoc Huginn does not support
38%
Discovering indicators of compromise
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Jakob Owens on Unsplash
and then look through an applied example of what a security analyst does with them. (See also the "Steps in the Hacker Lifecycle" box.) Steps in the Hacker Lifecycle First, no single, perfect hacker
38%
The state of open source groupware
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Andrey Bayda, 123RF.com
PostPath for $215 million. Cisco's stated goal: to establish the software-as-a-service offering Cisco WebEx Mail as the counterpart to offers from Google and Microsoft. Cisco also acquired the instant
38%
Tuning SSD RAID for optimal performance
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © ELEN, Fotolia.com
calculations are. With four SSDs in a RAID 5 setup, the HWR achieves almost 180,000 IOPS – more than double the performance of a single SSD. SWR does not quite achieve this number, just exceeding the 150
38%
Open Source Security Information and Event Management system
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Yoichi Shimizu, 123RF.com
to the Internet (e.g., T1/E1, DSL, etc.) as well as the types of packet filters it is behind. It does this without generating any network traffic, as active fingerprinting tools like DNS lookups, traceroute
38%
DiffServ service classes for network QoS
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Elgris, Fotolia.com
networks, this model also applies if no QoS policies have been configured or the infrastructure does not support QoS. With the best-effort model, there is no guarantee that the packets will be delivered

« Previous 1 ... 109 110 111 112 113 114 115 116 117 118 119 120 121 122 ... 160 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice