Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (887)
  • Article (212)
  • News (103)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 22 23 24 ... 121 Next »

10%
Digital signatures in package management
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Igor Stevanovic, 123RF.com
Armed with a checksum, users can determine whether a package has passed through the Internet without error. The MD5, SHA1, and SHA256 hash methods are popular ways to calculate a checksum for a package
10%
Finding Memory Bottlenecks with Stream
25.09.2013
Home »  HPC  »  Articles  » 
the code states should be good enough for caches up to 20MB. The Stream FAQ recommends you use a problem size such that each array is four times the sum of the caches (L1, L2, and L3). You can either change
10%
The Aurora Mesos Framework
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Anton Gvozdikov, 123RF.com
resources = Resources(cpu = 0.1, ram = 20*MB, disk = 20*MB), 09 processes = [hello_world_process]) 10 11 hello_world_job = Job( 12 cluster = 'test', 13 role = os.getenv('USER'), 14 task = hello
10%
Filesystem Encryption
12.05.2014
Home »  Articles  » 
 
Typically the encryption keys are 128- or 256-bit Advanced Encryption Standard (AES) keys, which evidently is fairly strong encryption. (My apologies, but I’m not in a position to judge the quality
10%
Processor and Memory Affinity Tools
14.09.2021
Home »  HPC  »  Articles  » 
 $(find /sys/devices/system/cpu -regex ".*cpu[0-9]+/topology/thread_siblings_list") | sort -n | uniq 0,32 1,33 2,34 3,35 4,36 5,37 6,38 7,39 8,40 9,41 10,42 11,43 12,44 13,45 14,46 15,47 16,48 17,49 18,50 19,51 20,52 21,53 22,54 23,55 24,56 25
10%
CPU affinity in OpenMP and MPI applications
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © podfoto, 123RF.com
,32 1,33 2,34 3,35 4,36 5,37 6,38 7,39 8,40 9,41 10,42 11,43 12,44 13,45 14,46 15,47 16,48 17,49 18,50 19,51 20,52 21,53 22,54 23,55 24,56 25,57 26,58 27,59 28,60 29,61 30,62 31,63 The lstopo tool
10%
Process, Network, and Disk Metrics
26.02.2014
Home »  HPC  »  Articles  » 
 reqs merged:           3.76/s     Write reqs completed:            2.12/s    Read BW:                     0.01 MB/s  Write BW:                        0.02 MB/s    Avg sector size issued      25.28       Avg
10%
Kubernetes k3s lightweight distro
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image Photo by Josh Rakower on Unsplash
, according to the README file, requires "half the memory, all in a binary less than 40MB" to run. By design, it is authored with a healthy degree of foresight by the people at Rancher [3]. The GitHub page [4
10%
Even benchmarks can be easy to handle
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
. You can create memory pressure in the system by launching eight RAM hogs: stress -m 8 --verbose These tasks malloc 256MB and touch a byte every 4096 bytes, which dirties each memory page and forces
10%
Fast system management from Puppet Labs
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Artmann Witte, fotolia.com
="http://activemq.apache.org/schema/core" brokerName="localhost" useJmx="true"> 10 11 12 13 14 15

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 22 23 24 ... 121 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice