Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (415)
  • Article (162)
  • News (7)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 26 27 28 29 30 31 32 33 34 35 36 37 38 39 ... 59 Next »

16%
Thread processing in Python
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Christos Georghiou, 123RF.com
): 17 sol[i,0] = 0.0 18 sol[i,ny-1] = 0.0 19 # end for 20 21 # Iterate 22 start_time = perf_counter() 23 --> with pymp.Parallel(6) as p: <-- 24 for kloop in range(1,100): 25 soln = sol
16%
Manage status messages in CouchDB with MapReduce
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Photo by Austin Distel on Unsplash
Design Document with Views { "_id": "_design/queries", "_rev": "6-856a5c52b1a9f33e136b7f044b14a8e6", "language": "javascript", "views": { "by-timestamp": { "map": "function (doc) {\n
16%
Extended File Attributes
20.04.2022
Home »  HPC  »  Articles  » 
SquashFS UBIFS Yaffs ReiserFS Reiser4 XFS Btrfs OrangeFS Lustre OCFS2 1.6 ZFS F2FS Some of the filesystems have restrictions on extended file attributes
16%
Improved visibility on the network
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Lead Image © Sergii_Figurnyi, 123RF.com
bottlenecks and prioritizing data traffic on the corporate network. As Figure 6 shows, throughput is visualized both graphically and as a table for Top N applications, Top N conversations, and Top N hosts
16%
Roll out hybrid clouds with Ansible  automation
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © markovka, 123RF.com
port 22/TCP). The same applies to the external gateway computer. Here, the VPN input can then be limited to the local VPN gateways' static IPs – if available. This does not offer very strong protection
16%
Obtain certificates with acme.sh
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Lead Image © Stuart Miles, 123RF.com
, such as: _acme-challenge.www.example.org. 300 IN TXT "Y5YvkzC_4qh9gKj6...jxAjEuX1" Additionally, the protocol uses nonces to protect against replay attacks and provides a workflow for revoking issued
16%
Elastic Beanstalk
29.10.2013
Home »  Articles  » 
 
Linux running PHP 5.3     5) 32bit Amazon Linux running Node.js     6) 64bit Amazon Linux running Node.js     ... Don’t create an RDS instance this time, so type n for that option; however, notice how
16%
Stat-like Tools for Admins
19.11.2014
Home »  HPC  »  Articles  » 
machine. Before Linux 2.6.11, unknown The first lines of output from vmstat are the averages since the last reboot, and unless you are interested in this information, it can be safely ignored
16%
Why Good Applications Don't Scale
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © man64, 123RF.com
: In Equation 1, a is the application speedup, n is the number of processors, and p is the "parallel fraction" of the application (i.e., the fraction of the application that is parallelizable), ranging from 0
16%
Automatic data encryption and decryption with Clevis and Tang
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Photo by London Scout on Unsplash
supports various encryption and decryption methods, for automatic data decoding. In the Clevis world, these methods are known as PINs (hence the name Clevis and Tang) [6]. The Tang service can be used

« Previous 1 ... 26 27 28 29 30 31 32 33 34 35 36 37 38 39 ... 59 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice