Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1278)
  • Article (303)
  • News (160)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 155 156 157 158 159 160 161 162 163 164 165 166 167 168 ... 175 Next »

9%
Building more efficient database applications with a graph database
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Jakub Krechowicz, 123RF.com
comparison in Table 1. Table 1 Five Graph Databases Name Neo4j 1.6 Sones Graph DB 2.0 InfoGrid 2.9.5 HyperGraphDB 1.1 VertexDB Homepage http
9%
Warding off the rise of VoIP spam
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Izaokas Sapiro, 123RF.com
, and to provide protection against VoIP spam by various means. Additionally, other initiatives are SpITAssassin [6], an extension of SpamAssassin functionality, and the SPIT defense solution (SPIT AL). SPIT AL
9%
Build a Network Attached Storage System with FreeNAS
10.12.2013
Home »  Articles  » 
, plus the parity level of the group. Thus, the optimal RAID-Z1 group sizes are 3, 5, and 9 disks, RAID-Z2 are 4, 6, and 10 disks, and RAID-Z3 are 5, 7, 11 disks. When combining multiple RAID-Z groups
9%
HPC Monitoring: What Should You Monitor?
15.01.2014
Home »  HPC  »  Articles  » 
submitted jobs (the peak was around 4:00pm, and the low point was around 6:00-7:00am). Just imagine having that information about your cluster. If you use a charge-back model, you could charge more to submit
9%
Data Analysis with Panda
12.03.2014
Home »  HPC  »  Articles  » 
by convention – but not necessarily – is imported using: import numpy as np Multidimensional matrices are created in a similar way, that is, with nested lists: np.array([[1, 2, 3], [4, 5, 6]]) If the content
9%
MapReduce and Hadoop
27.02.2012
Home »  HPC  »  Articles  » 
importance. Info [1] Dean, J., S. Ghemawat. “MapReduce: Simplified Data Processing on Large Clusters.” In : OSDI ’04: 6th Symposium on Operating Systems Design and Implementation (USENIX and ACM SIGOPS
9%
Denial of Service in the Cloud
12.11.2013
Home »  Articles  » 
. Therefore, the URL must be modified slightly for each instance of access. Thus, just 6,000 unsuspecting users of a browser like Chrome can generate a flood of up to one million requests per second. Attacks
9%
VMware Tools
15.10.2013
Home »  Articles  » 
performance monitoring at the application level is only possible after the integration of vFabric Hyperic 5.6. Infrastructure Navigator vCenter Operations Manager provides extensive reporting and analysis
9%
Linux Essentials for Windows Admins – Part 1
10.07.2012
Home »  Articles  » 
 
value of 644 (rw (6 )-r (4 )--r (4 )-- ). What is the permission value of a file that has the following permissions? rwxrw-r-- The correct answer is 764 . What about for the read-only file (r
9%
URL Tricks with htaccess
02.02.2012
Home »  Articles  » 
 
to the end of the URL after the slash so rather than bit.ly/R4c6feh , you could instead use bit.ly/dictionaryword . Another feature some services offer is the ability to edit the destination URL at a later

« Previous 1 ... 155 156 157 158 159 160 161 162 163 164 165 166 167 168 ... 175 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice