Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: brain causing -(liทe@248fvcen)-สูตรหวยออนไลน์.wco ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1075)
  • Article (285)
  • News (93)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 112 113 114 115 116 117 118 119 120 121 122 123 124 125 ... 146 Next »

24%
Determining CPU Utilization
25.02.2016
Home »  HPC  »  Articles  » 
for the kernel to move them between cores. In that case, the CPU utilization plots would show a specific core at a high percentage that then drops low, while the CPU utilization on a different core rises
24%
OpenFlow-capable Zodiac WX access point
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Photo by Florian Biedermann on Unsplash
how they fit together, even if the OpenFlow numbering does not necessarily match the device's port numbers. Ports in this case are the slots where the network cables are plugged in. Of course
24%
How Open Source Helped CERN Find the Higgs Boson
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Tim Bell
?" he said. However, CERN is investigating the use of machine learning in many areas. "It's still quite a new technology, and it takes a while to apply this to the research use cases. Since
24%
Assess USB performance while exploring storage caching
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Lucy Baldwin, 123RF.com
larger 1GB write test, showing a wider difference: The Samsung disk is delivering four times as high a write rate as the unbranded flash in this case. The "Gnome Disks" write-speed graph (jumpy red line
24%
Debugging Bash scripts automatically
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Andre Zhak, 123RF.com
activated when its condition is met. In all cases, a program with breakpoints is run by entering cont: bashdb<1> cont After this command, the code runs until bashdb detects the activation of a breakpoint
24%
TheSSS: World's Smallest Server Suite
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © zhao lizu, 123RF.com
. In any case, you boot into a console on a Linux 3.10.23 SMP kernel; TheSSS does not come with a GUI. After starting the system, the all-powerful root user first needs to enter a new password. The
24%
Understanding the Spanning Tree protocol family
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © Joellen Armstrong, Fotolia.com
for the case of existing linkages going DOWN. Time for convergence is still necessary when adding new switches to the network. Rapid Spanning Tree Protocol To shorten the convergence time, Cisco released
24%
Nagios on a Rasp Pi 3 with NEMS
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Chris Gendreau; Fotolia
a browser and SSH, in which case no other hardware is necessary (i.e., a keyboard, monitor, or mouse). The Pi is powered by a 5V micro-USB. To avoid power issues, use a power supply that provides 2.5A
24%
Comparing PowerShell and Python
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Beboy, Fotolia.com
to use old code or specific packages and libraries that are still based on Python 2, you should, of course, use this version, especially in those cases where porting would be complex. Exploring old Python
24%
Diving into infrastructure security
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © JPaget RFphotos, 123RF.com
at various points in your infrastructure. Network-based IoCs can be located in centralized locations in most cases. You will want to block IP addresses directly in the packet filter and use your internal DNS

« Previous 1 ... 112 113 114 115 116 117 118 119 120 121 122 123 124 125 ... 146 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice