Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcomm 12!600 Llorente"523 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (228)
  • Article (84)
  • News (2)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 17 18 19 20 21 22 23 24 25 26 27 28 29 30 ... 32 Next »

28%
Build secure IoT applications with open source
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Maksim Kabakou, 123RF.com
: Mbed TLS [4]: The new name of PolarSSL after the acquisition by ARM. It's an embedded-friendly TLS (DTLS since version 2.0) library. Implemented in C and easy to port to new targets. TinyDTLS [5
28%
Validating Docker containers
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © 36clicks, 123RF.com
of a command-line tool written in Go. CST carries out all the intended tests and returns a test report when done. The source code is licensed under the Apache 2.0 license and is available from GitHub [1
28%
Tuning SSD RAID for optimal performance
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © ELEN, Fotolia.com
with 20 percent overprovisioning, the potential write IOPS performance increases from 12,000 IOPS to 33,000 IOPS; at 40 percent, this is even 47,000 IOPS. For read-only access, the performance remains
28%
The practical benefits of network namespaces
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Morganimation, fotolia.com
: Asymmetrical routing can be relatively easily avoided with namespaces. In practice, virtual veth<x> network devices are fairly typical for network namespaces. Whereas a physical device can only exist
28%
Red Hat's cloud and virtualization portfolio
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
into Red Hat's cloud stack (Figure 1). After all, CloudForms 1.1, DeltaCloud 1.0, Storage Server 2.0, JBoss Middleware, and Enterprise Virtualization 3.1 form the foundation for the new products
28%
Error-correcting code memory keeps single-bit errors at bay
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Igor Stevanovic, 123RF.com
-related error information and report it. This was initially done outside of the kernel at the beginning of the project, but, starting with kernel 2.6.16 (released March 20, 2006), edac was included
28%
Red Hat Storage Server 2.1
05.03.2014
Home »  Articles  » 
on weekdays costs no less than 9,000 Euros, while the same cluster with 24x7 support is priced at 14,000 Euros. Realistically, however, no one will operate cloud storage with only two nodes; assuming you have
28%
Sort out your SSH configs
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © saniphoto, fotolia.com
; only your explicitly allowed IP addresses present in /etc/hosts.allow can get that far. Another useful precaution is to kick people off the server who have been idle for 20 minutes (i.e., 1,200 seconds
28%
Machine learning and security
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Vlad Kochelaevskiy, 123RF.com
.sin(periods * 2 * np.pi * t) 12 return max(value, 0.0) 13 else: 14 value = np.sin(periods * 2 * np.pi * t) 15 return max(value, 0.0) 16 17 # building the data vector 18 my_data = [] 19 i = 0 20 while
28%
Logger in HPC System Administration
07.07.2025
Home »  Articles  » 
or incorporated into scripts. Introduction to Logger All of the examples in this article are from a rather dated Ubuntu 20.04 system, although logger  works the same way on current distributions. The basic syntax

« Previous 1 ... 17 18 19 20 21 22 23 24 25 26 27 28 29 30 ... 32 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice