Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: kind Man high line mind(711bmw.com)kind Man high line mind(711bmw.com)w3c ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (339)
  • Article (86)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 26 27 28 29 30 31 32 33 34 35 36 37 38 39 ... 43 Next »

13%
AMD’s Greg Stoner on ROCm
31.10.2017
Home »  HPC  »  Articles  » 
-very-proprietary world of GPU-accelerated high-performance computing. We sat down with ROCm Senior Director Greg Stoner to find out why ROCm could bring big changes to the HPC space. ADMIN Magazine: How about if you
13%
Radeon Open Compute Ecosystem
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
-very-proprietary world of GPU-accelerated high-performance computing (HPC). We sat down with ROCm Senior Director Greg Stoner to find out why ROCm could bring big changes to the HPC space. ADMIN Magazine: How about
13%
Zero trust planning and implementation
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © magiceyes, 123RF.com
) are particularly critical, which together with attack surface management (ASM) makes it possible to determine where criticality for business operations and risks from attack surfaces are particularly high
13%
Unicode migration with an Oracle database
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© joingate, 123RF.com
_LANG=GERMAN_GERMANY.WE8MSWIN1252 (i.e., on the command line in DOS); the database then assumes that no transcoding is necessary because the two character sets are the same. The DOS client thinks that the characters
13%
Secure Your KVM Virtual Machines
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © George Tsartsianidis, 123RF.com
, the connection is opened with, for example: virt-manager -c qemu+ssh://root@example.com/system For security reasons, the SSH server should require a user login and reject root. As a compromise, you could go
13%
The Ruby Version Manager (RVM) hands-on
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
©Mettusr, 123RF.com
the script directly off the network in a command line: bash < <(curl -s https://rvm.beginrescueend.com/install/rvm) The Bash script, which will run on Linux and OS X, uses Git to download more program code
13%
Acorn facilitates the deployment of apps in Kubernetes
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Önder Örtel on Unsplash
to the vendors of programs. In this and many other places, the motto "Kubernetes first" applies. Infrastructure as Code and continuous integration/continuous deployment (CI/CD) pipelines with all kinds
13%
Goodbye virtual machines, hello microVMs
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Eric Froehling on Unsplash
with the lightweight and fast bring up/bring down behavior of containers to create a cloud VM kind of stack on a laptop? Can you also have the tooling that provides a declarative automation experience? The answer is yes
13%
Proactive threat detection
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © dunord, 123RF.com
from suspicious data packets in network traffic and taking preventive measures before an attacker can exploit the opportunity. Many services of this kind are on the market, Coroot [1] being just one
13%
Comparing 5 to 50TB NAS storage boxes
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Franck Boston, fotolia.com
. This makes simple mirroring mainly useful for particularly sensitive data that is mostly read. RAID 2-4 RAID levels 2, 3, and 4 avoid the high cost of mirroring by reducing redundancy slightly and computing

« Previous 1 ... 26 27 28 29 30 31 32 33 34 35 36 37 38 39 ... 43 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice