Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last three months
Sort order
  • Date
  • Score
Content type
  • Article (Print) (39)
  • Article (3)
  • News (1)
Keywords

« Previous 1 2 3 4 5 Next »

82%
Living with Limits in the Post-PC Era
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
 
of when we imagine a traditional desktop computer. But, when contemporary analysts write and speak about the Post-PC Era, they're talking about desktop computers and standard laptops as well. By my
82%
Monitoring Tools for Admins
04.11.2025
Home »  Articles  » 
, data virtualization service (DVS) Nonuniform memory access (NUMA) properties Network topology Message passing interface (MPI) communication statistics Power consumption CPU temperatures
82%
More TUI Tools for HPC Users
06.10.2025
Home »  Articles  » 
simple job can use the cpufetch  command. Figure 1 shows example output of the cpufetch  command on my laptop.  Figure 1: Output from cpufetch. Note
82%
Tools for troubleshooting the network
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Photographer, 123RF.com
, a laptop and an extra cable tester will be more helpful. This mix of equipment, however, is more unwieldy, heavier, more complex, and less robust than a specialized network tester. In contrast, Lan
81%
Avoiding common mistakes in high-performance computing
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Maxim Kazmin, 123RF.com
.e., MPI) and a batch scheduler. This arrangement offers a quick victory for the administrator, but could cause serious upgrade issues and downtime in the future. For instance, upgrading to a new
81%
Practical SELinux
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Pavel Ignatov, 123RF.com
can be solved. On desktop systems, an applet also provides information on whether access was blocked by SELinux. Malware Protection We also have a family laptop in the living room; my wife and son
81%
One metric to rule them all
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
, I'll examine the response of my laptop to: watch cat /proc/loadavg 0.03 0.03 0.07 1/362 23038 This is what an idle system looks like. When examining load average numbers, you should also be aware
81%
The System Security Services Daemon
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Nikita Sobolkov, 123RF.com
, but the cause is often much more trivial. For example, roaming users who do not always have a network connection for their laptops will obviously not always be able to communicate with a central directory service
81%
Dispatches from the world of IT
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
 
as a managed service that are accessible remotely on a variety of clients, including desktop systems, laptops, and even the iPad. However, the platform can be a bit tricky to spec out, so VMware is providing
80%
Techniques for archiving email
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
.marqs, photocase.com
are storing their email or whether they are covered by a backup plan. Users tend to manage offline archives locally on laptops and PCs that are not covered by the backup policy. If the laptop is lost or damaged

« Previous 1 2 3 4 5 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice