Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: [tippo365.com]tune its go each real money[tippo365.com]tune its go each real moneygram ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (733)
  • Article (234)
  • Blog post (6)
  • News (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 13 14 15 16 17 18 19 20 21 22 23 24 25 26 ... 98 Next »

10%
Purdue Model for industrial networking
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © James Thew, Fotolia.com
Model are crucial for the development of targeted security and control strategies. Giving each level its specific security protocols tailored to its needs ensures effective protection of the integrity
10%
OpenMP – Loops and Data Control
08.05.2019
Home »  HPC  »  Articles  » 
, reduction , firstprivate , or lastprivate  will cause a compiler error. firstprivate( )  says each thread should have its own copy of the variable(s) specified in ( ) . In actuality, it gets
10%
Graphical management solutions for Docker
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Elena Rouame on Unsplash
the status of each container. The Quick Actions column gives you quick access to various tasks. A link for each container lets you view its logfile. The button bar above the container table is used
10%
Failure to Scale
03.07.2013
Home »  HPC  »  Articles  » 
of ways to do this. The first, which I already mentioned, is to have each process do its own I/O. This approach requires careful coding, or you could accidentally corrupt the data files. The most common
10%
Upheaval
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
 
people. I find little value in either. I love working at home, from a hotel room, or from the comfort of a rented condo at the beach. I'm not sure there's any real advantage to going into an office
10%
Tools for testing container vulnerability
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by mari lezhava on Unsplash
, you need port forwarding and a configuration file for the SQL client on the host to enable access with the correct password and username combination. The going gets even tougher where administrators
10%
Hardware suitable for cloud environments
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Orlando Rosu, 123RF.com
. If the network switches are on their last legs, all the power in the world from the compute nodes is not going to help. If the network has not been sensibly planned, its hardware cannot be replaced or scaled
10%
Mobile PC Monitor
20.02.2012
Home »  Articles  » 
 
of an agent, a client, and a dashboard. It sounds like a standard monitoring delivery scenario, and it is, but with one catch: It’s mobile. Mobile means you’re able to monitor your systems from a phone
10%
Compiler Directives for Parallel Processing
12.08.2015
Home »  HPC  »  Articles  » 
, each accelerator has its own unique properties, so applications have to be written for that specific accelerator. How about killing two birds with one technology? Is it possible to have a simple way
10%
Modern Fortran – Part 2
15.12.2016
Home »  HPC  »  Articles  » 
notation. Moreover, it’s very easy to change the domain without having to modify the formula itself. Also introduced as part of HPF were compiler directives. These directives deal with how data

« Previous 1 ... 13 14 15 16 17 18 19 20 21 22 23 24 25 26 ... 98 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice