Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcode%3 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1355)
  • Article (345)
  • News (204)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 180 181 182 183 184 185 186 187 188 189 190 191 Next »

13%
Make Your IT Automation Systems Play Together Like a Symphony
15.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
© jeancliclac, Fotolia.com
’s URL, which would be the following, if you’re browsing it from the server itself: https://localhost/cookbooks You’ll see the Chef Server default page, as shown in Figure 3
13%
Useful NFS options for tuning and management
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © gortan123, 123RF.com
tuning options, and (3) NFS management/policy options (Table 1). In the sections that follow, these options are presented and discussed. Table 1 Tuning Options NFS Performance Tuning
13%
Detecting system compromise
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Nah Ting Feng, 123RF.com
of the entire dynamic state (Figure 3). This method, in effect, resets the window of vulnerability from boot time to the time of the most recent measurement
13%
Networking strategies for Linux on Azure
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image ©pakhnyushchyy, 123RF.com
Linux VMs, providing more granular control. It's also important to audit and update NSG rules regularly (Figure 3) to ensure they remain aligned with your security policies and the evolving threat
13%
Designing a secure Active Directory
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Samantha Sophia on Unsplash
information, such as home drives or Windows Local Administrator Password Solution (LAPS). According to MITRE ATT&CK [3], attackers derive their techniques from these three AD functions and deploy them
13%
Parallel Versions of Familiar Serial Tools
28.08.2013
Home »  HPC  »  Articles  » 
-core run of Pigz and Pbzip2 on a 1.1GB file (the test was done in 2011). He found that he got a 3.5 times speedup using four cores compared with a single core (pretty good scaling). However, don’t always
13%
HPC Monitoring: What Should You Monitor?
15.01.2014
Home »  HPC  »  Articles  » 
days, then you might be able to capture data about whether a node is alive or dead infrequently, perhaps every 5-15 minutes, or even longer if you like. Checking it once every 3 seconds seems a bit like
13%
The Cloud’s Role in HPC
05.04.2013
Home »  HPC  »  Articles  » 
, assume the building block is a four-socket AMD node with 16 cores per socket (64 physical cores). Also assume that you oversubscribe the physical cores 3:1, producing 192 VMs per physical server
13%
Compiler Directives for Parallel Processing
12.08.2015
Home »  HPC  »  Articles  » 
of cache from L1, to L2, to L3 (and even L4) before going to main memory. Current CPUs also have several cores per processor. Although CPU improvements have brought wonderful gains in performance, the desire
13%
Interview with Gregory Kurtzer, Developer of Singularity
21.04.2016
Home »  HPC  »  Articles  » 
a repository of containers to which people can upload their work for others to download pre-made SAPPs; (3) to get Singularity included in the various distributions. To achieve all three goals, I need help

« Previous 1 ... 180 181 182 183 184 185 186 187 188 189 190 191 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice