Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (320)
  • Article (97)
  • Blog post (1)
  • News (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 22 23 24 25 26 27 28 29 30 31 32 33 34 35 ... 42 Next »

18%
New features in Windows Terminal Preview
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Mohamed Shaffaf on Unsplash
"monitor": "any" 07 }, 08 "keys": "ctrl+1" 09 }, 10 { 11 "command": 12 { 13 "action": "globalSummon", 14 "desktop": "onCurrent", 15 "monitor": "toMouse", 16 "name
18%
HTML to database with a Perl script
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Danila Krylov, 123RF.com
="menu"> 08 09 10 11 12 13 14 15
18%
What's new in SQL Server 2017
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © Fet, Fotolia.com
.4 (see also the "Migration Discount" box), SUSE Linux Enterprise Server v12 SP2, and Ubuntu 16.04. As expected, the RPM package for RHEL can also be installed and executed on CentOS 7 without problems
18%
How graph databases work
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © iofoto, Fotolia.com
[vertices:6 edges:6] 03 04 gremlin> g = graph.traversal() 05 ==>graphtraversalsource[tinkergraph[vertices:6 edges:6], standard] 06 07 gremlin> g.V().label().groupCount() 08 ==>[software:2,person:4] 09 10
18%
SHA-3 – The New Hash Standard
15.04.2013
Home »  Articles  » 
 
be no question of disabling the legacy algorithm for the time being. However, disabling MD5 signatures is something that you can (and should) do today. You can enable TLS 1.2 – given OpenSSL 1.0.1 and a recent 2.2
18%
Performance Health Check
13.06.2022
Home »  HPC  »  Articles  » 
.69 17.26 67.7 IS (4 cores) 0.6 2.16 8.2 LU (6 cores) 5.13 41.8   MG (4 cores) 1.2 3.8 39.1 SP (4 cores
18%
Measuring the performance health of system nodes
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Peter Hermes Furian, 123RF.com
.05 FT (4 cores) 1.69 17.26 67.7 IS (4 cores) 0.6 2.16 8.2 LU (6 cores) 5.13 41.8 MG (4 cores) 1.2 3.8 39
18%
Managing Linux Memory
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © J.R. Bale, 123RF.com
application server. On a system in a stable state, throughput initially is not affected by file operations, but after a certain value (e.g., 16,384MB), performance collapses. As Figure 1 shows
18%
Lmod – Alternative Environment Modules
30.01.2013
Home »  HPC  »  Articles  » 
: 2011-11-09 11:16:36 +0800 Thread model: posix GNU gcc version 4.2.0 (Open64 5.0 driver) [laytonjb@test1 ~]$ module avail Using your spider cache file -------------------- /usr
18%
Mesh Service for OSI Layers 2 and 3
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Photo by James Pond on Unsplash
Selector: 09 app:vpn-gateway 10 match: 11 route 12 - destination: 13 destinationSelector: 14 app:firewall The Network Service Mesh developers insist the adjustments to Kubernetes

« Previous 1 ... 22 23 24 25 26 27 28 29 30 31 32 33 34 35 ... 42 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice