Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1201)
  • Article (331)
  • News (166)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 147 148 149 150 151 152 153 154 155 156 157 158 159 160 ... 171 Next »

23%
Manage Linux containers with Docker
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © 36clicks, 123RF.com
with the Docker Index [4], a repository of publicly available images. Not Everything Fits Docker is not suited to all use cases, though. Containers can't do everything that a full virtual machine can do
23%
Web applications with Flask
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Photographer, 133RF.com
, and it is uncertain when version 0.10 will be released. Flask requires at least Python 2.5; Python 3 is not currently supported. The easiest approach is to install Flask with Virtualenv [4], which maintains a local
23%
Parallel Programming with OpenCL
04.11.2011
Home »  HPC  »  Articles  » 
). The reason for this is that some video card models don’t support storing arbitrary addresses [14]. If you use addresses that are integer-aligned (every 4 bytes), you are definitely on the safe side.  If you
23%
Container Apps
02.10.2017
Home »  Articles  » 
 
as it installs successfully. Figure 4: Installing a snap made by Canonical. Shopping Lists Another command you’ll need frequently is the list  command, which
23%
Prolog and Epilog Scripts
07.07.2021
Home »  HPC  »  Articles  » 
 (Listing 3). The first loop creates a directory for the user in /scratch , /dev/shm/jobs , and /tmp  if they do not exist; does a chown  to the user; and sets the permissions. A second script (Listing 4) from
23%
Analyzing Logs
03.11.2022
Home »  HPC  »  Articles  » 
well when text zooms by on the screen, but we can pick out patterns in visual data. To help us, the tool Kibana (Figure 1; CC BY-SA 4.0) ties into Elasticstack to provide visualization. At a high level
23%
Getting Data Into and Out of the Cluster
14.08.2023
Home »  HPC  »  Articles  » 
 -h  option because it produces human-readable output. A second way to check that the NFS filesystem is mounted is to use the mount  command and specify the filesystem type: $ mount -t nfs4 With this command
23%
Posteo, Mailbox.org, Tutanota, and ProtonMail compared
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Kirill Bodrov, 123RF.com
organization Electronic Frontier Foundation (EFF). This involves encrypting communications in the data center and between email servers using HTTPS and HSTS [3] and Perfect Forward Secrecy (PFS) [4]. Posteo
23%
Collaborative online office solutions
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Photo by Truong Trung Cap Kinh Té Du Lich Thành Pho Ho Chí Minh CET on Unsplash
and the document below (Figure 4). Figure 4: Etherpad offers a smart approach to keeping a version history. Jumping back in the timeline also updates
23%
Ergonomics and security of graphical email clients
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Lead Image © Vlad Kochelaevskiy, Fotolia.com
it is started (Figure 4). An automated recognition routine for various email providers is provided, allowing the software to adapt quickly to different server addresses, port numbers, and transport encryptions

« Previous 1 ... 147 148 149 150 151 152 153 154 155 156 157 158 159 160 ... 171 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice