Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (313)
  • Article (93)
  • News (7)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 10 11 12 13 14 15 16 17 18 19 20 21 22 23 ... 42 Next »

19%
Understanding Cybersecurity Maturity Model Certification
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Braden Collum on Unsplash
of the DIB sector, the DoD cannot scale its organic cybersecurity assessment capability to conduct on-site assessments of approximately 220,000 DoD contractors every three years. As a result, the Department
19%
NetFlow reporting with Google Analytics
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Qi Feng, 123RF.com
, or User scopes). These include custom dimensions: 1. srcaddr 2. dstaddr 3. srcport 4. dstport 5. protocol 6. exporter_id 7. input_if 8. output_if 9. tos and custom metrics: 1. bytes (integer) 2
19%
Galera Cluster for MySQL
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Noel Powell, fotolia.com
.168.56.103:3306:1 Incoming address: 127.0.0.1:3306 , control FIFO: /tmp/glbd.fifo Control address: 127.0.0.1:4444 Number of threads: 6, source tracking: OFF, verbose: OFF, daemon: YES Destinations: 3 0
19%
Dispatches from the world of IT
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
 
, recently pushed out its 1.3.0 release with what it calls "dualstack" host monitoring, which offers support for IPv6 as well as IPv4. No doubt that feature is going to be crucial in the next few years ... 3
19%
News for Admins
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Gernot Krautberger, Fotolia
accounts of Apple users, including @icloud and @me domains. The group is demanding a ransom of $75,000 in Bitcoin or Ethereum or $100,000 in iTunes gift cards. The news was first reported by Motherboard
19%
High-Performance Python 1
16.07.2019
Home »  HPC  »  Articles  » 
 +=x[i]     return total   x = numpy.arange(10_000_000); %time sum(x)   CPU times: user 1.63 s, sys: 0 ns, total: 1.63 s Wall time: 1.63 s Next, add Numba into the code (Listing 2) so the @jit  decorator can be used
19%
Lmod – Alternative Environment Modules
30.01.2013
Home »  HPC  »  Articles  » 
, for a library that uses a specific compiler and MPI library, you would end up with a module names like atlas-3.10.0-opempi-1.6.2-open64-5.0 . The name is useful because it tells the user the library version
19%
Time flies, but it can still be measured
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
.019s The process listing took about 3/100 of a second to execute in the real world and was allocated 5/1,000 of a second of CPU time in kernel mode (i.e., executing system calls) and about 2
19%
Two NexentaOS derivatives compared
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© iofoto, fotolia.com
style as Redundancy Groups: RAID-1, RAID-Z1 (like RAID-5), RAID-Z2 (like RAID-6), and RAID-Z3 (with triple parity). Netgear uses these modes, too, but calls them RAID-5 and RAID-6, following the classic
19%
Network monitoring with Icinga and Raspberry Pi
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © AndreaDanti, 123RF.com
Load 30 check_command check_nrpe!check_load!5.0!4.0!3.0!10.0!6.0!4.0 31 } 32 define service{ 33 use generic-service ; Name of service

« Previous 1 ... 10 11 12 13 14 15 16 17 18 19 20 21 22 23 ... 42 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice