Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (577)
  • Article (118)
  • News (2)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 18 19 20 21 22 23 24 25 26 27 28 29 30 31 ... 70 Next »

6%
Matlab-like tools for high-performance computing
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
://wiki.scilab.org/Documentation/ParallelComputingInScilab parallel_run http://help.scilab.org/docs/5.4.0/en_US/parallel_run.html Parallel programing http://my.opera.com/muksitsyahlan/blog/2011/01/05/parallel-programming-with-scilab-2 MPI
6%
Getting your virtual machine dimensions right
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by ROCCO STOPPOLONI on Unsplash
the dimensions completely wrong and go for 56 vCPUs and 1.5TB of vRAM (shown in the figure as the red monster VM2). On the other hand, you could do it the right way: 26 cores or 52 hypertreads per NUMA node. I
6%
Migrate your Git repositories to Gitea
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Ray Hennessy on Unsplash
as desired. Classic Migration Most moves involving Git repos are likely to differ significantly from my special case. You will usually need to move from SERVER_1 to SERVER_2. You can see the specific
6%
Profiling Python code
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image ©-Yong Hian Lim, Fotolia.com
_time) print(" Time taken in seconds: {0} s").format(time_taken_in_micro) If a section of code is called repeatedly, just sum the elapsed times for the section and sum the number of times that section
6%
Hardening mail servers, clients, and connections
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by jesse ramirez on Unsplash
advertising messages, fraud attempts, spoofed sender addresses, and many other dirty tricks began to flourish. Since then, associations such as the Internet Engineering Task Force (IETF), which defines ... If you don't want to hand over your mail to a corporation, you have to operate your own mail server. Securing it sensibly involves some effort.
6%
Transparent SIP communication with NAT
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © studiom1, 123RF.com
in these situations. The only way to achieve this in all cases is to route the data through a TURN server that can be reached on the public network. For this purpose, a client on the TURN server can request an endpoint
6%
Profiling Python Code
09.12.2019
Home »  HPC  »  Articles  » 
 to check follows a, b = 1,2 c = a + b # Code to check ends end_time = time.time() time_taken = (end_time- start_time)   print(" Time taken in seconds: {0} s").format(time_taken_in_micro) If a section of code
6%
Programming with Node.js and JavaScript
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © lightwise 123rf.com
been niche products compared with Rails and PHP frameworks. The situation is different with the Node.js platform (or Node for short) [2], which has been extremely popular for several years and has
6%
Credential harvesting at the network interstice
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Galyna Andrushko, 123RF
-alive Cookie: PHPSESSID=bv3jerd7e9s2hsi2hs8cv2r7ua; security=impossible 208.54.155.25/scripts/csrf/ The key information in this connection is that the website uses PHP and keeps its PHP scripts
6%
Troubleshooting and analyzing VoIP networks
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Ioannis Kounadeas, Fotolia.com
problems on Open Systems Interconnection (OSI) model Layer 2 or 3 is almost trivial compared with VoIP analysis. In Internet telephony, the sources of error migrate to higher OSI Layers 4 through 7. Vo

« Previous 1 ... 18 19 20 21 22 23 24 25 26 27 28 29 30 31 ... 70 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice