Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (284)
  • Article (99)
  • News (43)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 30 31 32 33 34 35 36 37 38 39 40 41 42 43 Next »

39%
Access Anywhere with Mobile IPv6
16.04.2013
Home »  Articles  » 
. It is used by all the parties (i.e., the mobile node, correspondent node, and home agent) in messages that have to do with the management and updating of bindings. Figure 3 shows the configuration
39%
Forensic Analysis on Linux
30.04.2013
Home »  Articles  » 
abuse of these devices by malware, it was necessary to disable this kind of access [3]. To remove this restriction, you need to rebuild the kernel without CONFIG_STRICT_DEVMEM , but this approach
39%
The Meson Build System
16.07.2014
Home »  HPC  »  Articles  » 
to the value /opt/helloworld . If the hello program returns 0 , the test is passed; any other value means a failure. Listing 3: Unit Test prg = executable('hello', 'main.c') test('A Test', prg, args
39%
Read-only File Compression with SquashFS
14.06.2017
Home »  HPC  »  Articles  » 
example illustrating the change in file size: $ ls -lsah FS_scan.csv  3.2M -rw-r--r-- 1 laytonjb laytonjb 3.2M 2014-06-09 20:31 FS_scan.csv $ gzip -9 FS_scan.csv  $ ls -lsah FS_scan.csv.gz  268K
39%
(Re)Installing Python
17.07.2023
Home »  HPC  »  Articles  » 
My first try was just to use Anaconda to install everything. To be sure that TensorFlow, PyTorch, and CuPy all used GPUs properly, I used simple check commands: python3 -c "import tensorflow
39%
Desktop Blades (of Glory)
06.05.2024
Home »  HPC  »  Articles  » 
over Ethernet. The blade has a Gigabit Ethernet port on the back, an HDMI port at the front, and a USB-C port on the bottom of the blade near the back (on the right in Figure 3). A USB-A port is present
39%
Monitor your network infrastructure with SNMP
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © lightwise, 123RF.com
the community string with -c. On top of this, you need the hostname or the IP address of the computer to query and its OID. If you simply enter a dot for the latter, snmpwalk queries all available OIDs (Figure 3
39%
Interoperability across clouds
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © alenavlad, 123RF.com
, which allows access to the graph and run-time context of an application. ARIA TOSCA is equipped with some basic workflows responsible for (1) installation, (2) uninstallation, (3) customization, and (4
39%
Securing and managing Microsoft IIS
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
; however, you should leave logfile encoding set to UTF 8. Logfile formats include: W3C (default): These logfiles are stored as text; the Select Fields button lets you specify what should be logged
39%
Manage Windows AD with PowerShell
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Kelly Sikkema on Unsplash
of the AD. To check whether the object has been created, use: configPartition = (Get-ADRootDSE).configurationNamingContext Get-ADObject -Filter * -SearchBase "LDAP://CN=62a0ff2e-97b9-4513-943f-0d221bd30080

« Previous 1 ... 30 31 32 33 34 35 36 37 38 39 40 41 42 43 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice