Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1346)
  • Article (336)
  • News (252)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 120 121 122 123 124 125 126 127 128 129 130 131 132 133 ... 194 Next »

9%
IBM offers a sensational $34 billion for Red Hat
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
 
, says IBM [1]. Red Hat has 12,600 employees compared with the 366,000 employees at IBM. The supervisory boards of the two companies have already approved the deal. The consent of the Red Hat shareholders
9%
News for Admins
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © vlastas, 123RF.com
release cycles (approximately 12 weeks), non-signed add-ons will only trigger a warning in Firefox. After the transition period, release and beta versions of Firefox will not install unsigned extensions
9%
Alternative container runtimes thanks to the Open Container Initiative
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Photo by Braden Collum on Unsplash
Kubernetes cluster, you will find detailed instructions online [12]. In addition to CRI-O, another CRI-compliant implementation with and OCI runtime is now available in the form of cri-containerd [13
9%
Many approaches help secure a web server
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © alexwhite, 123RF.com
. The full 100 points are currently only available if you only use TLS 1.2. Since this excludes older clients (Android older than 4.4 or Internet Explorer older than 11), you should also activate TLS 1 and TLS
9%
News for Admins
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
 
1.2 depends on lazy page table entry (PTE) enforcement, the same mechanism on which the Meltdown flaw exploitation relies. Spectre is not a single vulnerability; it's a class or family of flaws
9%
Linux distributions for containers
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © tiero, 123RF.com
(Listing 4). Listing 4 New Filesystem Tree # rpm-ostree status TIMESTAMP (UTC) VERSION ID OSNAME REFSPEC * 2015-09-30 12:07:07 22 c4421f1bba
9%
Automating with Expect Scripts
12.11.2012
Home »  Articles  » 
 
to define a # character to toggle this mode off and on. set force_conservative 0 ;# set to 1 to force conservative mode even if ;# script wasn’t run conservatively originally
9%
Why Good Applications Don’t Scale
13.10.2020
Home »  HPC  »  Articles  » 
, a is the application speedup, n is the number of processors, and p is the “parallel fraction” of the application (i.e., the fraction of the application that is parallelizable), ranging from 0 to 1. Equations are nice
9%
Why Good Applications Don't Scale
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © man64, 123RF.com
: In Equation 1, a is the application speedup, n is the number of processors, and p is the "parallel fraction" of the application (i.e., the fraction of the application that is parallelizable), ranging from 0
9%
Hyper-V with the SMB 3 protocol
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Vladimir Kramin, 123RF.com
this operation. Thus, in addition to higher performance and better availability, SMB 3 also supports high availability. New in SMB 2.0 and 2.1 SMB was initially developed by IBM and integrated by Microsoft

« Previous 1 ... 120 121 122 123 124 125 126 127 128 129 130 131 132 133 ... 194 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice