Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %6mbps Llorente" ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (929)
  • Article (270)
  • News (113)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 25 26 27 28 29 30 31 32 33 34 35 36 37 38 ... 132 Next »

16%
Systemd network management and container handling
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Kritiya Sumpun, 123RF.com
off unmanaged 6 docker0 ether routable configured 7 virbr0 ether no-carrier unmanaged The previously set up DNS stub resolver now uses the DNS
16%
Securing the container environment
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © zeferli, 123RF.com
--server 3.71.72.105 -i Figure 2: Getting all secrets from containers in the cluster. 6. Container breakouts: Attackers might exploit vulnerabilities
16%
GENEVE network tunneling protocol
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Eugene Zhyvchik on Unsplash
and the beginning of the frame. MAC addresses: 6 bytes for the MAC address of the target device, followed by 6 bytes for the MAC address of the source device. 802.1Q tag: 4 bytes with information about the VLAN
16%
News for Admins
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
 
kernel 5.13, support for a wide variety of hardware including x64-64, ARMv7, ARM64, POWER8, POWER9, IBM s390x (LinuxONE), and RISC-V, and software updates such as Qemu 6.0, libvirt 7.6, PHP 8.0.8, Apache 2
16%
Hardening network services with DNS
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © Amy Walters, 123RF.com
before the fingerprint encode the algorithm and hash method used [1]. Digits 1 to 4 on the left stand for (in ascending order) RSA, DSA, ECDSA, and Ed25519. No algorithm has been assigned for 5 yet, and 6
16%
Speed up your MySQL database
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Mikhail Dudarev, 123RF.com
3584 689528 0 76 4 124 802 2759 7 6 88 0 0 <- < Start of swapping > 0 1 103260 117124 3528 636156 0 92336 0 92556 834 2607 7 5 83 5 0 2 1 126168 138116 3552
16%
Prepare, analyze, and visualize data with R
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Buchachon Petthanya, 123RF.com
If you add an additional element to the names vector and again try to create a data frame from numbers and names, an error occurs because numbers has a length of 5 and names has a length of 6 (Listing 2
16%
Finding Memory Bottlenecks with Stream
25.09.2013
Home »  HPC  »  Articles  » 
) 8 (4) 7.2 0.9 Nehalem-EP (2009) 8 (4) 32 4 Westmere-EP (2010) 12 (6) 42 3.5 Westmere-EP (2010) 8 (4) 42
16%
Parallel Julia – Jumping Right In
29.06.2012
Home »  HPC  »  Articles  » 
). FreeBSD: x86/64 (64-bit); x86 (32-bit). The following examples were built and run on a Limulus personal cluster running Scientific Linux 6.2 on an Intel i5-2400S with 4GB of memory. If you don
16%
High-Performance Python 2
22.08.2019
Home »  HPC  »  Articles  » 
 mult.multiply_(byref(a), byref(b)) print add.addtwo_(byref(a), byref(b)) The output from the Python code is: $ python3 testfunc.py 8 6 If you like, you can write a simple Python wrapper function for the shareable objects, so it's easier

« Previous 1 ... 25 26 27 28 29 30 31 32 33 34 35 36 37 38 ... 132 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice