Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1263)
  • News (419)
  • Article (310)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 180 181 182 183 184 185 186 187 188 189 190 191 192 193 ... 200 Next »

12%
An introduction to a special tool for transforming data formats
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Artsem Martysiuk, 123RF.com
. The tlogRow component provides support and displays arbitrary intermediate results (Figure 6). Figure 6: The tlogRow component logs arbitrary intermediate
12%
Detecting and analyzing man-in-the-middle attacks
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Soner Eker on Unsplash
Interfaces button opens a dialog with the local interfaces that you can use for monitoring. The Input tab provides the network interfaces that Wireshark uses for sniffing. Equally important is Edit
12%
macOS file recovery and security
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Sgursozlu, Fotolia.com
restrictions on the user when working. At the same time, however, this provides better protection for the system. However, you do need to take this into account when recovering data and be careful when using
12%
A GUI for Warewulf 4
06.05.2025
Home »  Articles  » 
everything they need to do in the web UI. As mentioned, the web UI will soon be in tech preview, which presents an opportunity for you to use and provide feedback on the web UI. Plus, you can help Warewulf
12%
Traffic analysis with mitmproxy
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © r lakhesis, 123RF.com
Companies that provide web services for the outside world in their own infrastructure are exposed to a variety of threats. The developers of the open source mitmproxy tool describe it as the Swiss
12%
Serverless applications with OpenFaaS
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Kier in Sight Archives on Unsplash
, but having Docker is useful for the OpenFaaS command-line interface (CLI)). OpenFaaS CLI: faas-cli for managing functions. The quickest way to install it on your machine is with the OpenFaaS-provided script
12%
Gathering Data on Environment Modules
10.09.2012
Home »  HPC  »  Articles  » 
of business is unfinished – getting the data to a central log. Logger (Not Frogger) Providing a logging feature that creates a log entry for a user action but does not allow the user to read or touch the file
12%
OpenACC – Porting Code
07.03.2019
Home »  HPC  »  Articles  » 
  directives can provide. For example, if the code runs on one core and the CPU has four cores, then ideally, the code will run four times faster with OpenACC directives. Because I’m focusing on just the loops
12%
OpenMP – Loops and Data Control
08.05.2019
Home »  HPC  »  Articles  » 
be exploited to provide additional control and possibly additional performance. Data and Control Parallelism A quick review of the do /for  OpenMP directive brings up some points that should be clarified
12%
Darshan I/O Analysis for Deep Learning Frameworks
18.08.2021
Home »  HPC  »  Articles  » 
the provided wrappers (Perl scripts) to create an instrumented binary. Darshan uses the MPI profiling interface of MPI applications for gathering information about I/O patterns. It does this by “… injecting

« Previous 1 ... 180 181 182 183 184 185 186 187 188 189 190 191 192 193 ... 200 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice