Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (735)
  • Article (266)
  • News (33)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 21 22 23 24 25 26 27 28 29 30 31 32 33 34 ... 104 Next »

30%
Beyond monitoring: Mathematical load simulation in Perl
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© kudryashka, 123RF.com
Model"; 11 $work = "ebiz-tx"; 12 $node1 = "WebServer"; 13 $node2 = "AppServer"; 14 $node3 = "DBMServer"; 15 $think = 0.0 * 1e-3; # as per test system 16 $dtime = 2.2 * 1e-3; # dummy service time 17 18
30%
Mounting Compressed Archives as a User
25.01.2022
Home »  HPC  »  Articles  » 
to get into the Linux kernel. A couple of my earlier articles that mention FUSE address data encryption and working with S3QL object storage. As evident by these applications, FUSE can be very useful
30%
Magnum: Exploring OpenStack's Container API
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Ulrich M ller, 123RF.com
.2 224984 49332 pts/30 S+ 12:20 0:16 /usr/bin/python /usr/bin/magnum-api stack 19844 0.0 1.4 228088 57308 pts/31 S+ 12:20 0:03 /usr/bin/python /usr/bin/magnum-conductor $ which magnum /bin
30%
Segmenting networks with VLANs
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Maxim Kazmin, 123RF.com
2 3 4 5 6 7 8 0 0 0 0 1 1 1 1 2 1 0 0 0 0 0 0
30%
DNSSEC-aware DNS caching with Unbound
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Antonella Grandoni , Fotolia.com
don't set up this section properly, you might end up amplifying distributed denial of service (DDoS) attacks on the Internet. Listing 3 Security Settings # only give access to recursion
30%
Parallel Julia – Jumping Right In
29.06.2012
Home »  HPC  »  Articles  » 
| | | | | | |/ _` | | | | |_| | | | (_| | | Version 0.0.0+86921303.rc6cb _/ |\__'_|_|_|\__'_| | Commit c6cbcd11c8 (2012-05-25 00:27:29) |__/ | julia> If you don't want to see the title on subsequent start ups use julia -q
30%
Get the best out of your bandwidth with tc
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Russell Shively, 123RF.com
25Mbit allot 1514 cell 8 weight 2500Kbit prio 3 \maxburst 20 avpkt $PKT bounded 16 # Now add filters to your child class 17 tc filter add dev $DEV protocol ip parent 1:0 prio 100 u32 match ip $DIR 12
30%
Application virtualization with Docker
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Oleksiy Mark, 123RF.com
context Step 0 : FROM fedora ---> 7d3f07f8de5f Step 1 : MAINTAINER Thorsten Scherf ---> Running in e352dfc45eb9 ---> f66d1467b2c2 Removing intermediate container e352dfc45eb9 Step 2 : RUN yum update -y
30%
Introduction to LVM
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Dvarg, 123RF.com
to modify their paths or work with alias constructions, or they can replace the disk(s) with a larger model and restore a backup of the complete system to the new disk. This last approach means
30%
Run One Program at any Scale with Legate
08.06.2021
Home »  HPC  »  Articles  » 
samples from a uniform distribution over [0,1). The equation is then solved by the solve routine. NumPy on GPUs NumPy functions are all single threaded unless the underlying NumPy code is multithreaded

« Previous 1 ... 21 22 23 24 25 26 27 28 29 30 31 32 33 34 ... 104 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice