Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (579)
  • Article (179)
  • News (16)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 26 27 28 29 30 31 32 33 34 35 36 37 38 39 ... 78 Next »

29%
Profiling application resource usage
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© fauxware, fotolia.com
to 4.2GHz) 4MB L2 cache 384 Radeon cores 800MHz GPU clock speed DDR3 1866MHz memory 100W Putting both the CPU and the GPU on the same processor allows the GPU to have access to system
29%
Millions of Intel Processors Are Vulnerable to Attack
21.11.2017
Home »  News  » 
 
Firmware versions 11.0/11.5/11.6/11.7/11.10/11.20, SPS Firmware version 4.0, and TXE version 3.0 are impacted.” The affected products include sixth, seventh, and eighth generation Intel Core Processor
29%
OrientDB document and graph database
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Victoria, Fotolia.com
.translation embeddedmap; 09 10 create class Relation extends E; 11 create property Relation.from date; 12 13 create class Appear extends E; 14 create property Appear.chapter embeddedlist integer 15 16 insert into Person
29%
Automated Azure Kubernetes Service cluster builds
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Kittipong Jirasukhanont, 123RF.com
pods running in it, enter: $ kubectl get pods -n default The welcome output is shown in Listing 6. Listing 6 View of nginx Pods NAME READY STATUS
29%
Accessing Fortran code with Python
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Kheng Ho Toh, , 123RF.com
.multiply_(byref(a), byref(b)) print add.addtwo_(byref(a), byref(b)) The output from the Python code is: $ python3 testfunc.py 8 6 If you like, you can write a simple Python wrapper function for the shareable objects
29%
Amazon Announces AWS Fargate
12.12.2019
Home »  News  » 
 
regions (with more to come soon): US East (N. Virginia), US East (Ohio), Europe (Ireland), and Asia Pacific (Tokyo). Original announcement: https://www.argus-press.com/news/national/article_a30c4ca6-fffc
29%
Accelerated and targeted search and find with Ripgrep
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Photo by Andrew Tom on Unsplash
location, use -B <n>; -A <n> does the same thing for lines after the find. You can search compressed text archives with -z -a and a combination of options (Figure 6
29%
Free Enterprise Backup with Bareos
12.11.2013
Home »  Articles  » 
community to continue development of an independent fork named Bareos. The first stable release was Bareos 12.4 in April 2013 (the version number stands for the year and the quarter of the feature freeze
29%
Digital asset management
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Claudia, Fotolia.com
Alchemy [5]. Phraseanet [1] has been available for download since 2010 under the GPLv3 via GitHub. We installed version 3.8. Before installing, admins should take a look at the documentation [6] to prepare
29%
Understanding Privilege Escalation
13.12.2011
Home »  Articles  » 
 
. First, get the distribution name: $ cat /etc/issue Ubuntu 8.04 \n \l An intruder typically executes some basic commands to get to know the system. Of particular interest are the \etc directory

« Previous 1 ... 26 27 28 29 30 31 32 33 34 35 36 37 38 39 ... 78 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice