Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (540)
  • Article (182)
  • News (124)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 28 29 30 31 32 33 34 35 36 37 38 39 40 41 ... 85 Next »

18%
Porting CUDA to HIP
15.11.2019
Home »  HPC  »  Articles  » 
]. The HACC codebase consists of about 15,000 lines of .h and .c files. When porting the HACC codebase, 95 percent of the code passed without modification or was converted automatically using the hipify
18%
Rocky Reaches for a Role in HPC
12.09.2022
Home »  HPC  »  Articles  » 
, and the connections with the HPC community, in addition to a governance structure that eliminates the possibility of a sudden end like the fate that befell CentOS. According to Kurtzer, Rocky had more than 10,000
18%
Detecting phishing domains with dnstwist
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © tobkatrina, 123RF.com
explains on his website that a user who wants to check all variants of "google.com" manually would need more than 300,000 queries and that this number would then increase to more than 5 million queries
18%
News for Admins
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
 
commitment to open source. Docker has also taken Linux containers beyond Linux by working with Microsoft to bring more than 900,000 Docker images to Microsoft Azure and Windows, thanks to the Hyper
18%
The end of SHA-1
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © destinacigdem, 123RF.com
. This attack makes it possible to generate the same checksum for any two datasets with relatively little overhead and inserts additional byte sequences into the data [4]. Currently, hardware worth less than $35,000
18%
News for Admins
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
 
. ProtonMail raised more than $57,000 in just a few days through the ProtonMail Defense Fund to rebuild their infrastructure and retool their systems to resist further attacks
18%
Interview: Nginx's Gus Robertson
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
server for the 100,000 busiest sites on the Internet. The Nginx company culture is built upon our core values: progress, excellence, openness, and curiosity. As a small company that is growing quickly, we
18%
News for Admins
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
 
that campaign, hackers scanned up to 59,000 IP networks for exposed API endpoints. Once attackers located an exposed endpoint, an Alpine Linux OS container was deployed to run the command chroot /mnt /bin/sh -c
18%
IBM offers a sensational $34 billion for Red Hat
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
 
, says IBM [1]. Red Hat has 12,600 employees compared with the 366,000 employees at IBM. The supervisory boards of the two companies have already approved the deal. The consent of the Red Hat shareholders
18%
News for Admins
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © vlastas, 123RF.com
popularity indicators for a price. The report estimates 50,000 routers are infected with the Moose worm. Most of the attack traffic targets Twitter and Instagram

« Previous 1 ... 28 29 30 31 32 33 34 35 36 37 38 39 40 41 ... 85 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice