Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xsede15 Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (540)
  • Article (160)
  • News (78)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 14 15 16 17 18 19 20 21 22 23 24 25 26 27 ... 79 Next »

12%
Small-board computers
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © Author, 123RF.com
, and a boot flash card is fairly inexpensive (assuming you have a monitor and keyboard/mouse). For example, you can get a quad-core 32-bit ARM system with all of this for around $90 ($35 for an ODROID-C1, $20
12%
Darshan I/O analysis for Deep Learning frameworks
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Michaela Murphy on Unsplash
="test.bin", status="replace", & 18 action="readwrite", & 19 iostat = ierr) 20 if (ierr > o) then 21 write(*,*) "error in opening file Stopping" 22 stop 23 else 24 do
12%
Getting started with the Apache Cassandra database
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Almos Bechtold on Unsplash
# Intra-node communication 22 - 7000 23 # TLS intra-node communication 24 - 7001 25 # JMX 26 - 7199 27 # CQL 28 - 9042 29
12%
Professional backup solutions compared
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Kamil Macniak, 123RF
. In most cases, 90 percent of a full backup will be identical to the previous full backup, so the full backup does not need to be sent to the backup server again. Instead, the backup server creates a backup
12%
News for Admins
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
 
about getting Ubuntu with the FIPS 140 validated module, contact Canonical via this form (https://ubuntu.com/security/fips#get-in-touch). Kubernetes 1.22 Released with 56 Enhancements Kubernetes 1.22
12%
Importing SSH keys on AWS
05.08.2011
Home »  CloudAge  »  Blogs  »  Dan Frost's Blog  » 
 
see the newly uploaded keypair: ec2-describe-keypairs KEYPAIR dan-key fc:39:b2:60:90:4c:0f:66:fc:b8:a6:54:af:19:0c:ef KEYPAIR my-key a6:54:af:19:0c:ef:fc:39:0f:66:fc:b8:b2:60:90:4c KEYPAIR your
12%
News for Admins
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
© Crimson, fotolia.com
90% of All SSL VPNs are Insecure Security firm High-Tech Bridge has conducted a statistical study that indicates 90% of all SSL-based VPNs in the world use insecure or outdated encryption
12%
When I/O workloads don't perform
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © Viacheslav Iakobchuk, 123RF.com
- 28 (Min/Max 22/28) 191 G-Sense_Error_Rate 0x0032 100 100 --- Old_age Always - 0 192 Power-Off_Retract_Count 0x0032 100 100 --- Old_age Always - 35 193
12%
Five multipurpose thin clients compared
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © David Grigg, 123RF.com
Optional No No PCI slot No No Optional Only with Z90DE7 No PCMCIA slot No No No No No Power supply
12%
Lmod 6.0: Exploring the Latest Edition of the Powerful Environment Module System
16.07.2015
Home »  HPC  »  Articles  » 
  following additional environment variables are defined:   CC   (path to gcc compiler wrapper      ) CXX  (path to g++ compiler wrapper      ) F77  (path to gfortran compiler wrapper ) F90  (path

« Previous 1 ... 14 15 16 17 18 19 20 21 22 23 24 25 26 27 ... 79 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice