Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %256mb%C3%A9n Llorente 20 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (123)
  • Article (55)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 ... 18 Next »

18%
Processor and Memory Metrics
12.02.2014
Home »  HPC  »  Articles  » 
B       hald-addon-input   ...    22.9 MiB +   4.0 MiB =  26.9 MiB       plasma-desktop  26.0 MiB +   5.7 MiB =  31.7 MiB       konsole (3)  28.3 MiB +   4.4 MiB =  32.7 MiB       kwin  41.0 MiB +   2.0 MiB =  43.0 MiB       Xorg 146.9
18%
Visualizing containers with clarity
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Ulrich Müller, 123RF.com
(abridged) $ docker build -t dockly . Sending build context to Docker daemon 16.52MB Step 1/9 : FROM node:8-alpine 8-alpine: Pulling from library/node e6b0cf9c0882: Pull complete 93f9cf0467ca: Pull
18%
Security first with the Hiawatha web server
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Tatiana Popov, 123RF.com
toolkit for joomla UrlToolkit { ToolkitID = joomla Match base64_encode[^(]*\([^)]*\) DenyAccess Match (<|%3C)([^s]*s)+cript.*(>|%3E) DenyAccess Match GLOBALS(=|\[|\%[0-9A-Z]{0,2}) Deny
18%
Spanning Tree Protocol
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
troubleshooting or address performance issues on your Ethernet network, it helps to have some basic knowledge of Spanning Tree. Understanding Spanning Tree Figure 1 shows three examples (A, B, C) of topologies
18%
Modern Fortran – Part 1
20.10.2016
Home »  HPC  »  Articles  » 
), has to be specified. Here is a simple example of the declaration:       INTEGER, TARGET :: a(3), b(6), c(9)       INTEGER, DIMENSION(:), POINTER :: pt2 Another quick example of multidimension arrays
18%
Dynamic routing in Linux with Quagga
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© petrol, 123RF.com
password 8 ZDF339a.20a3E 05 log file /var/log/quagga/zebra.log 06 service password-encryption 07 ! 08 interface eth0 09 multicast 10 ipv6 nd suppress-ra 11 ! 12 interface eth1 13 ip address 10
17%
A Brief History of Supercomputers
21.01.2021
Home »  HPC  »  Articles  » 
This first article of a series looks at the forces that have driven desktop supercomputing, beginning with the history of PC and supercomputing processors through the 1990s into the early 2000s. ... May 1988 AMD K6-2 MMX and 3DNOW! SIMD, 200–570MHz; 64KiB L1 cache Jun 1998 Pentium II Xeon SIMD; L2 cache from 512KB to 2MB Feb 1999 Pentium III 9 ... This first article of a series looks at the forces that have driven desktop supercomputing, beginning with the history of PC and supercomputing processors through the 1990s into the early 2000s.
17%
Update your Docker containers safely
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © yelenayemchuk, 123RF.com
sha256:f1ca87d9adb678b180c31bf21eb9798b043c22571f419ed844bca1d103f2a2f7 bf85f2b6bf52 13 months ago 15.5MB The output shows information on both the original nginx:alpine image and the updated
17%
Dig Deep into Kubernetes with StatusBay
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Noel Powell, Fotolia.com
-amd64.tar.gz.sha256sum [...snip] e6be589df85076108c33e12e60cfb85dcd82c5d756a6f6ebc8de0ee505c9fd4c helm-v3.1.2-linux-amd64.tar.gz $ sha256sum helm-v3.1.2-linux-amd64.tar.gz e6be589df85076108c33e12e60cfb85
17%
Pattern matching dispute in Python 3.10
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Steve Harvey on Unsplash
, which the programmer specifies in terms of one or more cases. This method is superficially similar to a switch statement in C, Java, or JavaScript, but far more powerful. Python 3.10 is now also set ... A controversial change is taking place in Python version 3.10 known mainly from functional languages: pattern matching. ... Pattern matching dispute in Python 3.10

« Previous 1 2 3 4 5 6 7 8 9 10 11 ... 18 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice