Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: kind Man high line mind(711bmw.com)kind Man high line mind(711bmw.com)w3c ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (339)
  • Article (86)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 22 23 24 ... 43 Next »

14%
All you ever wanted to know about hard drives but never dared ask
16.05.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
Lucy Baldwin, 123RF
altogether [2]. An unprintable infographic [3] makes this point very poignantly (be sure to zoom in at the very top of the picture); optimization is simply a race to get to wait on I/O faster if permanent
14%
Package applications in Docker containers
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Jonathan Sanchez on Unsplash
, not all software can be easily packaged and kept up to date with the use of traditional package formats, especially for distributions like Kali Linux that ship hundreds of highly specialized applications
14%
Session cookies as targets for criminals
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Vyshnavi Bisani on Unsplash
. Figure 1: Displaying the local storage of a web application in developer mode. This kind of storage is not a problem as long as the validity is limited to the duration of the browser session
14%
Log Management
10.10.2022
Home »  HPC  »  Articles  » 
issues or poor performance. (Remember, you want high-performance computing, not meh-performance computing.) Logs contain information about successful logins, failed logins, and any root access or use of
14%
Isolate workloads from Docker and Kubernetes with Kata Containers
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Stephen Pedersen on Unsplash
. To compare how Kata Containers performs against a runC run time, the script in Listing 3 starts 100 containers from the nginx image and stores a short, individual and static file, each containing the number
14%
Kubernetes for small and medium-sized enterprises
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © zelfit, 123RF.com
-native applications: https://www.suse.com/c/idg-study-cloud-native-2022-where-do-european-companies-stand-in-their-digital-transformation/ Microk8s: https://microk8s.io K3s: https://k3s.io Minikube: https
14%
Kubernetes containers, fleet management, and applications
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Murilo Viviani on Unsplash
on node 2, and container C on node 3, and make sure the container data sets are replicas (i.e., they match). Instead, the statement would read: Create three replicas of the same container. Kubernetes
14%
Determining CPU Utilization
25.02.2016
Home »  HPC  »  Articles  » 
In a general sense, high-performance computing means getting the most out of your resources. This translates to utilizing the CPUs (cores) as much as possible. Consequently, CPU utilization becomes
14%
Getting the most from your cores
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © ktsdesign, 123RF.com
and if it is using the cores as it should. Remember, the first two letters in HPC stand for "High Performance." Infos Techopedia: https://www.techopedia.com/definition/28291/cpu-utilization Enterprise
14%
Secure status and event monitoring of tier 0 systems
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Brian Jackson, 123RF.com
of a successful attack by these vulnerabilities may be greater than that of a supply chain attack. However, because the agents run on systems that are already highly isolated, vulnerabilities of this kind should

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 22 23 24 ... 43 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice