Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1285)
  • Article (342)
  • News (220)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 174 175 176 177 178 179 180 181 182 183 184 185 186 Next »

13%
Managing Vim plugins
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © Thomas Reichhart, 123RF.com
of responders [2]. Much of this popularity is due to the degree of customization created by its plugins – almost 1,600, according to the VimAwesome site [3], and even that number may be low. Most users
13%
Workspace ONE for endpoint management
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Davorr, Fotolia.com
. Figure 2: A schematic overview of Workspace ONE shows the interplay of the numerous components and interfaces. Image courtesy VMware. [3] Workspace ONE services are based on the integration of VMware
13%
Speed up Your Name Server with a MySQL Back End
23.07.2013
Home »  Articles  » 
 
admin (Table 1). Table 1: PowerDNS Features Authoritative DNS server (hosting) Resolving DNS server (caching) API to provision zones and records DNSSEC support (as of 3.x
13%
Centralized Password Management
06.08.2013
Home »  Articles  » 
 
them again can be the subject of long discussions. The organizational structure, broken down by division into departments and operating groups, however, can serve as a basis. Figure 3 shows some services
13%
Safe Files
16.04.2015
Home »  HPC  »  Articles  » 
techniques and compression algorithms. Public key: RSA EIGamal DSA Cipher: IDEA 3DES CAST5 [Symmetric-key block cipher. 64-bit block size, key size between 30 and 128 bits
13%
OpenACC – Porting Code
07.03.2019
Home »  HPC  »  Articles  » 
that lend themselves to parallelizing with directives. You can parallelize each loop individually (Table 2), giving you more control, or you can combine loop directives into a single directive (Table 3
13%
Parallel and Encrypted Compression
09.12.2021
Home »  HPC  »  Articles  » 
 -n # , where #  is the number of threads and a space falls between it and the switch (Listing 3). Listing 3: lbzip2 $ lbzip2 -v -n 4 package-list.txt lbzip2: compressing
13%
Make Your IT Automation Systems Play Together Like a Symphony
15.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
© jeancliclac, Fotolia.com
’s URL, which would be the following, if you’re browsing it from the server itself: https://localhost/cookbooks You’ll see the Chef Server default page, as shown in Figure 3
13%
Useful NFS options for tuning and management
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © gortan123, 123RF.com
tuning options, and (3) NFS management/policy options (Table 1). In the sections that follow, these options are presented and discussed. Table 1 Tuning Options NFS Performance Tuning
13%
Detecting system compromise
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Nah Ting Feng, 123RF.com
of the entire dynamic state (Figure 3). This method, in effect, resets the window of vulnerability from boot time to the time of the most recent measurement

« Previous 1 ... 174 175 176 177 178 179 180 181 182 183 184 185 186 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice