Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %2525252525252522Rub%25252525252525C3%25252525252525A9n Llorente%2010 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (279)
  • Article (57)
  • News (39)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 27 28 29 30 31 32 33 34 35 36 37 38 Next »

22%
VAX emulation with OpenVMS
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Ole Houen, 123RF
out that computer history was doomed to extinction if somebody didn't do something about it. This somebody was Supnik, who took the suggestion as an opportunity to move from assembler to the C
22%
Mobile hacking tool
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Valentina Curini on Unsplash
of the Kickstarter campaign in 2020, which raised the impressive sum of $4.8 million according to the Hackaday platform [2], an active community has sprung up around this practical device, helping to drive the project
22%
OpenStack observability with Sovereign Cloud Stack
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Michaela Filipcikova on Unsplash
for their environment and presented the resulting APIMon project at the OpenInfra Summit 2020 [9]. Following OpenInfra Summit 2022, APIMon developers met with members of the SCS community to consider how to collaborate
22%
Zero trust planning and implementation
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © magiceyes, 123RF.com
by Stephen Paul Marsh in his doctoral thesis at the University of Stirling (Scotland). The strategy only really became popular in 2020 when, as a result of the coronavirus pandemic, many companies had
22%
Server validation with Goss
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Ewa Walicka, fotolia.com
). If a check fails, you will need to carry out an in-depth investigation to determine the cause. Goss has been testing Linux systems for almost 10 years, with support for Windows being added in 2020, although
22%
Shadow admin permissions and your AWS account
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © zelfit, 123rf.com
:userid The unique ID for the current user. When IAM creates a user, user group, role, policy, instance profile, or server certificate, it assigns to each resource a unique ID that looks like AIDHJQAULZS4A3QDU476D
22%
A modern logging solution
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
> This configuration tells Fluentd to listen for logs on port 24224 and output them to the console. Then, you can start up by running fluentd -c fluentd.conf which is the Fluentd configuration file you created
22%
A Brief History of Supercomputers
21.01.2021
Home »  HPC  »  Articles  » 
This first article of a series looks at the forces that have driven desktop supercomputing, beginning with the history of PC and supercomputing processors through the 1990s into the early 2000s. ... in the C90 but with a much higher clock speed of 450MHz. The number of processors also doubled to 32. The system was not inexpensive with a 32-processor T932 costing $35 million ($59.76 million in 2020 ... This first article of a series looks at the forces that have driven desktop supercomputing, beginning with the history of PC and supercomputing processors through the 1990s into the early 2000s.
22%
Tuning ZFS for Speed on Linux
17.03.2020
Home »  HPC  »  Articles  » 
: $ cat /proc/partitions|grep nvme  259        0  244198584 nvme0n1  259        3   97654784 nvme0n1p1  259        4   96679936 nvme0n1p2 I will be using partition 1 for the L2ARC read cache, so to enable
22%
Comparing PowerShell and Python
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Beboy, Fotolia.com
as the multitude of existing standard modules), the use of exception conditions (exceptions), and the option of expanding the language (e.g., with code written in C). Unlike many interpreted languages, variable

« Previous 1 ... 27 28 29 30 31 32 33 34 35 36 37 38 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice