Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (467)
  • News (194)
  • Article (80)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 24 25 26 27 28 29 30 31 32 33 34 35 36 37 ... 75 Next »

16%
TKperf – Customized performance testing for SSDs and HDDs
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Orcea David, 123RF
into account the difference in performance at the beginning and end of a HDD. Because HDDs are written to from the outside in, shorter access paths of the read/write head lead to better performance, and faster
16%
SHA-3 – The new hash standard
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Warakorn Harnprasop, 133RF.com
, NIST announced that it would be developing a new hash standard and launched a competition to do so. The idea was for the world's leading cryptographers to submit proposals for the new standard
16%
Purdue Model for industrial networking
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © James Thew, Fotolia.com
mechanisms) lead to a greater risk of unauthorized access. Moreover, widespread data acquisition and processing by smart building systems poses a considerable challenge in terms of data protection
16%
Programming with Go
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Dimitar Dimitrov, 123RF.com
the variable. At the same time, this is only a statement, not an expression that can be used downstream. Although this leads to a little more typing, it does ensure clear semantics and less confusion. Go
16%
Avoiding chaos in clusters with fencing
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© kobra78, Fotolia.com
simultaneous write access to sensitive data leading to inconsistency. Is the Cluster Doing What it Should? Fencing mechanisms are important in the context of clusters whenever you need to ensure data integrity
16%
News for Admins
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
 
-in-class CDR agent, which achieved industry-leading results in the most recent MITRE ATT&CK testing," says Elad Koren (https://www.paloaltonetworks.com/blog/2025/02/announcing-innovations-cortex-cloud/), VP
16%
Power Talk
01.10.2011
Home »  Articles  » 
 
more resources are needed, and valleys, where more power efficiency is needed. The multi-threading capabilities are clearly leading the market towards more cores and away from higher clock speeds because
16%
Interview: AMD’s John Fruehe, Director of Server Product Marketing
04.11.2011
Home »  HPC  »  Articles  » 
-threading capabilities are clearly leading the market towards more cores and away from higher clock speeds because efficiency and throughput are more critical for enterprise applications.  AM: Based on the information
16%
Rocky Reaches for a Role in HPC
12.09.2022
Home »  HPC  »  Articles  » 
with the HPC community begin with Kurtzer and lead to other Rocky developers working to integrate Rocky Linux with the HPC environment.  The Rocky team is currently working closely with the OpenHPC project
16%
Backup and restore disks
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Photo by Omar Flores on Unsplash
lead both professionals and home users alike to skip making backups or only make them sporadically. Especially in heterogeneous environments, setting up cross-platform backup software often involves

« Previous 1 ... 24 25 26 27 28 29 30 31 32 33 34 35 36 37 ... 75 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice