Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %200mb%3%A9n Llorente"500 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (309)
  • Article (139)
  • News (49)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 ... 50 Next »

36%
Accelerated and targeted search and find with Ripgrep
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Photo by Andrew Tom on Unsplash
location, use -B <n>; -A <n> does the same thing for lines after the find. You can search compressed text archives with -z -a and a combination of options (Figure 6
36%
Run One Program at any Scale with Legate
08.06.2021
Home »  HPC  »  Articles  » 
Py code, but just in case you have not, this quick example creates an “empty” 2D array of size nx by ny : import numpy as np nx = 10 ny = 10 a = np.empty((nx,ny)) type(a) Array a is of data type numpy
36%
Dynamic routing in Linux with Quagga
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© petrol, 123RF.com
password 8 ZDF339a.20a3E 05 log file /var/log/quagga/zebra.log 06 service password-encryption 07 ! 08 interface eth0 09 multicast 10 ipv6 nd suppress-ra 11 ! 12 interface eth1 13 ip address 10
36%
Kibana Meets Kubernetes
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © wbraga, 123RF.com
-roggia name: elastic-stack version: 1.9.0 Check It Out If you tried to jump ahead and run a Helm command, you might have been disappointed. First, you need to make sure that Helm and K3s are playing
36%
Monitoring Storage with iostat
25.02.2013
Home »  HPC  »  Articles  » 
) 01/31/2013 _i686_ (1 CPU)01/31/2013 09:56:01 AM avg-cpu: %user %nice %system %iowait %steal %idle 14.78 0.38 3.47 2.16 0.00 79.21 Device: rrqm/s wrqm
36%
Static code analysis finds avoidable errors
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Andrey KOTKO, 123RF.com
.e., output all warnings) shows in Listing 4. Listing 3 Splint Warnings splint -strict example1.c Splint 3.1.2 --- 11 May 2019 example1.c: (in function main) example1.c:9:5: Format string
36%
Warewulf Cluster Manager – Development and Run Time
18.07.2012
Home »  HPC  »  Articles  » 
[laytonjb@n0001 ~]$ module avail ------------------------------- /opt/Modules/versions ------------------------------ 3.2.9 --------------------------- /opt/Modules/3.2.9/modulefiles ... Warewulf Cluster Manager – Part 3
36%
Serverless computing with AWS Lambda
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © joingate, 123RF.com
Id: 4e90b424-95d9-4453-a2f4-8f5259f5f263 Duration: 70.72 ms Billed Duration: 100 ms Memory Size: 128 MB Max Memory Used: 55 MB Init Duration: 129.20 ms More or Less
36%
New versions of the Endian and Sophos UTM solutions
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Dmitriy Cherevko, 123RF.com
 –  – UTM 220  – FullGuard Bundle  – US$ 2,870 Endian 3.0 Endian released the new version of its firewall in January. The version jump from 2.5.2 to 3.0 already shows
36%
Securing the container environment
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © zeferli, 123RF.com
Running kube-proxy 1 5bf2de2a3af3c kube-proxy-b65c9 The mitigations for the above technique could be used to ensure that no containers mount docker

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 ... 50 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice