Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (286)
  • Article (46)
  • News (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 20 21 ... 34 Next »

32%
Selecting Compilers for a Supercomputer
21.12.2017
Home »  HPC  »  Articles  » 
, built by IBM at a cost of around EUR135 million, has 19 compute islands with approximately 8,200 cores each, and six newer islands with 14,300 cores each. It achieves a speed of around 6 petaFLOPS (10
32%
Security risks from insufficient logging and monitoring
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Photo by Ryoji Iwata on Unsplash
], which provides application-based intrusion detection, or the ModSecurity web application firewall [6], which can be configured with the OWASP ModSecurity Core Rule Set [7]) generate sufficient logfiles
32%
Diving into infrastructure security
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © JPaget RFphotos, 123RF.com
requests from the Internet access to the corporate network. Depending on the size of your environment, firewalls can also isolate different departments. In addition to a fixed set of rules, a NIDS can use
32%
Parallelizing and memorizing Python programs with Joblib
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
bottleneck is reading and writing data to the local hard disk or across the network, rather than processor power, the number of processes can be higher. As a rule of thumb, you can go for the number
32%
macOS file recovery and security
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Sgursozlu, Fotolia.com
the Mac in Internet recovery mode with the Cmd+Alt+R keyboard shortcut. The last tool for data recovery I would like to introduce is PhotoRec [8]. It does not require any installation and starts from a USB
32%
Darshan I/O Analysis for Deep Learning Frameworks
18.08.2021
Home »  HPC  »  Articles  » 
 :: counter     integer :: counter_limit     integer :: ierr     type(rec) :: my_record     counter_limit = 2000     ierr = -1     open(unit=8,file="test.bin", status="replace", &          action
32%
New versions of the Endian and Sophos UTM solutions
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Dmitriy Cherevko, 123RF.com
is now familiar with applications like Dropbox, Facebook, Twitter, and Skype and thus allows more finely tuned firewall rules (Figure 1). In version 3.0, the Endian Firewall also replaces the ntop tool
32%
Fedora 18 for Admins
11.06.2013
Home »  Articles  » 
 
wiki, is 8GB. In the second attempt, the installation with a larger Btrfs partition executed properly, and Btrfs proved to be as stable in operation (Figure 1
32%
App Proxy support for Remote Desktop Services
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Iwona Castiello d'Antonio on Unsplash
Access. This scenario allows the IT team to offer both convenient access to services with SSO and to use the set of rules from Conditional Access to define policies that only allow access by known devices
32%
Building better software on schedule with DevOps
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
© J. Allspaw and P. Hammond 2009
. This correlation might make you curious as to what DevOps followers do differently. DevOps Principles The DevOps principles are still basically those described in 2009 (see the "DevOps Rules" box). The key here

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 20 21 ... 34 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice