Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1559)
  • News (435)
  • Article (314)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 197 198 199 200 201 202 203 204 205 206 207 208 209 210 ... 232 Next »

12%
SC25 Highlights
20.01.2026
Home »  Articles  » 
 
for data centers. Some companies are developing and are now offering jet engines to provide power. Aircraft manufacturer Boom Supersonic is developing natural gas turbines for power generation. These engines
12%
Container compliance with dockle
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
functionality. Listing 5 shows the example provided for a GitHub action failing on a WARN check level. (The dockle software comes with a variety of warnings (Table 1) that should help you grade the level
12%
Total Network Monitor
20.08.2013
Home »  Articles  » 
 
devices and arrange your equipment to provide a good overview. In map view, you can also add or remove devices, just as in the normal tree view. Integrating Servers and Services To monitor servers
12%
Managing Cluster Software Packages
12.02.2013
Home »  HPC  »  Articles  » 
provides easy management of various versions and packages in a dynamic HPC environment. One of the issues, however, is how to keep your Modules environment when you use other nodes. If you use ssh to log
12%
SHA-3 – The New Hash Standard
15.04.2013
Home »  Articles  » 
 
.2 or 2.4 version of the Apache web server – using the SSLProtocol configuration option. Listing 1 provides a potential server configuration. Listing 1: Apache Configuration SSLProtocol -SSLv2 +SSLv3
12%
How to Hide a Malicious File
09.01.2012
Home »  Articles  » 
 
that will not match the available antivirus signatures. The Metasploit penetration testing framework provides a collection of tools you can use to test a network by attacking it the way an intruder would attack it
12%
Distributed Linear Algebra with Mahout
11.05.2022
Home »  HPC  »  Articles  » 
-oriented software engineers will enjoy the simplified Samsara domain-specific language (DSL), which provides a stripped-down syntax that feels natural to people accustomed to writing with math notation, avoiding
12%
IO500
02.02.2025
Home »  HPC  »  Articles  » 
. Scoring IO500 takes the various scores and combines them into a single number, which is then used to rank the solutions. I don’t know how they combine them, but they provide raw scores that can be use
12%
iSCSI: Set up and use LIO targets
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Volodymyr Krasyuk, 123RF.com
for this; it provides the iscsiadm command. The iSCSI initiator needs a configuration that in turn assigns at least one IQN. However, the operating system can generate this itself. For discovery
12%
Testing the Samsung MU-PA500B 500GB SSD
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Lucy Baldwin, 123RF.com
the drive will provide under a high write load. Figure 2: Gnome Disks benchmark (1,000 10MiB samples) running on the Samsung T5. Note the garbage collection

« Previous 1 ... 197 198 199 200 201 202 203 204 205 206 207 208 209 210 ... 232 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice