Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (245)
  • Article (129)
  • Blog post (2)
  • News (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 14 15 16 17 18 19 20 21 22 23 24 25 26 27 ... 38 Next »

28%
New features in PHP 8
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Maxim Borovkov, 123RF.com
the appropriate variables, which are then assigned values by a constructor (Listing 3, lines 2-12). In PHP 8, this can be written in a concise way (Listing 3, lines 15-21). Listing 3 Encapsulating Data
28%
Secure SSH connections the right way
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © Olivier Le Moal, 123RF.com
of this type could look like. Listing 3 Generating Certificates $ ssh-keygen -s ca_root_key -h -n server.example.com,172.16.155.130 -I server.example.com -V +180d server.example.com $ ssh
28%
Comparing Ceph and GlusterFS
21.04.2015
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © agencyby, 123RF.com
of this category currently on the free and open source software market. On the commercial side, Amazon's S3 probably works very similarly. Binary Objects Object stores rely on binary objects because they can
28%
Kubernetes networking in the kernel
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © balein, 123RF.com
is the focus of this article. All these choices use VxLAN for internode communication. VxLAN is a reliable choice because its only requirement of the underlay network is that Layer 3 (L3) connectivity must exist
28%
Security data analytics and visualization with R
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Rancz Andrei, 123RF.com
inspirational is by Jay Jacobs and Bob Rudis [3] [4]. These few months later, my R skill level has improved just enough to share some insight with you. Imagine me as somewhere between total noob R script kiddie
28%
Co-Design Approach to Supercomputing
12.01.2012
Home »  HPC  »  Articles  » 
and architecture are available at http://www.lbl.gov/cs/html/greenflash.html, and you can read the complete research paper online at http://james.agu.org/index.php/JAMES/article/view/v3n12/v3n12HTML.
28%
Warewulf 4 – Environment Modules
20.03.2023
Home »  HPC  »  Articles  » 
this module, the module files under compiler  are available, but only those associated with gnu/8.5/  (Figure 3).  Figure 2: Path to the gnu/8.5 module
28%
Distributed storage with Sheepdog
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © kateleigh, 123RF.com
's S3. Scalability, (high) availability, and manageability were and still are the essential characteristics that Sheepdog seeks to provide. For Morita, setting up Ceph, which already existed at that time
28%
Sort Out the Top from the Bottom
25.05.2012
Home »  Articles  » 
 
bo in cs us sy id wa 0 0 1360 27788 125860 269804 0 0 390 43 308 572 8 3 84 5 In this case, it’s the io section you’re interested in. Input/Output is seemingly defined
28%
Finding and recording memory errors
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © lightwise, 123RF.com
should cause a machine check exception (MCE) [3], which should crash the system. The bad data in memory could be related to an application or to instructions in an application or the operating system

« Previous 1 ... 14 15 16 17 18 19 20 21 22 23 24 25 26 27 ... 38 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice