Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: laptop providing ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (276)
  • Article (80)
  • News (30)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 16 17 18 19 20 21 22 23 24 25 26 27 28 29 ... 39 Next »

6%
Darshan I/O Analysis for Deep Learning Frameworks
18.08.2021
Home »  HPC  »  Articles  » 
The Darshan userspace tool is often used for I/O profiling of HPC applications. It is broken into two parts: The first part, darshan-runtime , gathers, compresses, and stores the data. The second
6%
Rocky Reaches for a Role in HPC
12.09.2022
Home »  HPC  »  Articles  » 
high-profile HPC initiatives, such as Warewulf and Apptainer (formally Singularity). In parallel with launching Rocky Linux, Kurtzer started a company called CIQ to support Rocky development, consolidate
6%
Throw Down the Gauntlet
14.08.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
© bluebay, 123RF.com
 sslyze from: https://github.com/iSECPartners/sslyze             2. In your .zshrc or .bash_profile (or whatever), set $SSLYZE_PATH                     export SSLYZE_PATH=/path/to/sslyze.py                  3. Make
6%
Security as Code
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © bluebay, 123RF.com
://github.com/iSECPartners/sslyze 2. In your .zshrc or .bash_profile (or whatever), set $SSLYZE_PATH export SSLYZE_PATH=/path/to/sslyze.py 3. Make sure you have python installed: $ which python Notice
6%
PowerShell add-on security modules
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Shell modules provide a flexible way to provision functionality temporarily. When the console is closed, all extensions not loaded by profiles disappear from memory. Because actions and scripts can also remain
6%
News for Admins
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
 
also been a number of updates to Tuned, which is a collection of preconfigured performance profiles which enable you (with the help of Red Hat's extensive knowledge) maximize performance across all types
6%
Planning Performance Without Running Binaries
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Lucy Baldwin, 123RF.com
Usually the task of a performance engineer involves running a workload, finding its first bottleneck with a profiling tool, eliminating it (or at least minimizing it), and then repeating this cycle
6%
News for Admins
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
 
of an extra layer, named Seccomp. This new profile helps to prevent CVE and zero-day vulnerabilities and is enabled with the SeccompDefault option. Another new addition is the ability to leave swap on. Prior
6%
ESXi ransomware attacks
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Afif Ramdhasuma on Unsplash
your cluster's configuration profiles and the configurations of the virtual switches automatically. If not, you can run a backup manually or automate it with your own tools. Use the following commands
6%
Encrypt and decrypt files with Age or Rage
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
practical because these keys are already distributed in many places. Especially in the developer environment, you will find many public SSH keys in profiles on GitHub or GitLab. Unlike GnuPG, however, when

« Previous 1 ... 16 17 18 19 20 21 22 23 24 25 26 27 28 29 ... 39 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice