Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (244)
  • Article (35)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 10 11 12 13 14 15 16 17 18 19 20 21 22 23 ... 28 Next »

17%
Julia: A New Language For Technical Computing
31.05.2012
Home »  HPC  »  Articles  » 
Octave R JavaScript   v3f670da0 v2.7.1 vR2011a v3.4 v2.14.2 v8 3.6.6.11 fib 1.97 31.47 1,336.37 2
17%
Measuring the performance of code
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Lucy Baldwin, 123RF.com
-enabled as the first statement of the setup parameter with gc.enable(). Heisenberg's Law Heisenberg's law of profiling [6] holds that measuring a computing system alters it. How am I altering the system
17%
Touring the top Knoppix debugging and rescue tools
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Rafal Olechowski, 123RF.com
: 1386145 0 IO-APIC-edge pata_sch 07 15: 0 0 IO-APIC-edge pata_sch 08 16: 9 0 IO-APIC-fasteoi pciehp 09 17: 3398067 0 IO
16%
Embarrassingly parallel computation
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Lucy Baldwin, 123RF.com
Laboratory hosts a number of excellent parallel programming tutorials at its Leadership Computing Facility, including one demonstrating the Monte Carlo method in both serial and parallel implementations [6]. I
16%
SSL/TLS best practices for websites
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Yevgeniya Ponomareva, Fotolia.com
, the attacker cannot use the preference mechanism to stipulate weaker encryption. 6. Choice ofCipher Suite I recommend strong ciphers that implement 128-bit encryption. This list includes AES and Camellia
16%
Convert Linux shell commands into PowerShell cmdlets
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Larisa Birta on Unsplash
\\Documents\PowerShell\Modules\Microsoft.PowerShell.Crescendo\0.6.1\Samples folder with some sample files intended for Unix-style commands. Executing Commands The most common use of Crescendo-generated wrappers is to wrap command-line commands in verb
16%
Greylisting with Postgrey
22.06.2012
Home »  Articles  » 
 
435600 5-01:00:00 35 462400 5-08:26:40 36 490000 5-16:06:40 37 518400 6-00:00:00 38 547600 6-08:06:40 39
16%
Getting started with AI
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © Lightwise, 123RF.com
: CUDA Forward Compatibility mode ENABLED. Using CUDA 12.6 driver version 560.35.03 with kernel driver version 535.161.08. See https://docs.nvidia.com/deploy/cuda-compatibility/ for details. Epoch 1
16%
High availability clustering on a budget with KVM
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Yulia Saponova, 123RF.com
06 I_T nexus information: 07 LUN information: 08 LUN: 0 09 Type: controller 10 SCSI ID: deadbeaf1:0 11 SCSI SN: beaf10 12 Size: 0 13
16%
Getting started with the OpenStack cloud computing framework
28.06.2011
Home »  CloudAge  »  Articles  » 
 
) layer for the cloud, virtualizing the various hardware components and making them available through a standard API. The first OpenStack release (dubbed "Austin") became available October 22 [3]; The Open

« Previous 1 ... 10 11 12 13 14 15 16 17 18 19 20 21 22 23 ... 28 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice