Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %25x20mm 12%2048 Llorente%2022 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (142)
  • Article (51)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 Next »

28%
Relational databases as containers
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © James Thew, 123RF.com
databases in the market [11] is strong. Also, specialized container implementations like Shifter [12] or Singularity [13] are not covered in this article, because they play a subordinate role in the context
28%
Intruder Tools
13.12.2011
Home »  Articles  » 
 
 packetstormsecurity.org packetstormsecurity.org,199.58.210.12,A NS25.WORLDNIC.COM,205.178.190.13,SOA ns25.worldnic.com,205.178.190.13,NS ns26.worldnic.com,206.188.198.13,NS mail.packetstormsecurity.org,199.58.210.12,MX
28%
Red Hat's cloud and virtualization portfolio
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
into Red Hat's cloud stack (Figure 1). After all, CloudForms 1.1, DeltaCloud 1.0, Storage Server 2.0, JBoss Middleware, and Enterprise Virtualization 3.1 form the foundation for the new products
28%
Darshan I/O analysis for Deep Learning frameworks
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Michaela Murphy on Unsplash
counter = 1,counter_limit 25 my_record%x = counter 26 my_record%y = counter + 1 27 my_record%z = counter + 2 28 my_record%value = counter * 10.0 29
28%
Proactive Monitoring
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Tom Wang, 123RF.com
and runs in a Java virtual machine, Riemann has a web interface (the Riemann Dash) and various clients for Linux, OS X, and Windows. The Riemann service stores all the information in its index and uses
28%
Hacking Mutillidae II
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by USGS on Unsplash
-property binutils-x86-64-linux-gnu libmodule-scandeps-perl python3-docker cgroupfs-mount libperl5.32 python3-dockerpty containerd libproc
28%
Flexible backup for large-scale environments
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Photo by Nils Bouillard on Unsplash
-consuming task, which is why license models by volume or processor performance are not a good fit for university operations. The current hardware comprises two x86 servers running Solaris 11.4, which have access
28%
Configuration management with CFEngine 3
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © iofoto, Fotolia.com
management. The commercial edition is made more palatable because you can try out the software and manage up to 25 systems free of charge. Design Principles The CFEngine design is based on several principles
28%
Persistent Memory
14.01.2016
Home »  HPC  »  Articles  » 
DRAM. At the extreme, you can pretty much buy systems with 1-2TB of memory, but you probably don't buy too many of them because of cost. Typical compute nodes are in the 64-256GB range. Persistent memory
28%
How persistent memory will change computing
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © rangizzz, 123RF.com
than DRAM. At the extreme, you can pretty much buy systems with 1-2TB of memory, but you probably don't buy too many of them because of cost. Typical compute nodes are in the 64-256GB range. Persistent

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice