Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1260)
  • News (419)
  • Article (309)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 ... 200 Next »

22%
Remora – Resource Monitoring for Users
08.12.2020
Home »  HPC  »  Articles  » 
Remora provides per-node and per-job resource utilization data that can be used to understand how an application performs on the system through a combination of profiling and system monitoring. ... Remora. REMORA: REsource MOnitoring for Remote Applications, from the University of Texas Advanced Computing Center (TACC), combines monitoring and profiling to provide information about your application ... Remora provides per-node and per-job resource utilization data that can be used to understand how an application performs on the system through a combination of profiling and system monitoring.
22%
Two-Factor Authentication
02.04.2013
Home »  Articles  » 
 
Making your systems really secure can be a bit more complicated than resorting to the use of regular passwords. In this article, we provide an overview of authentication solutions and present ... be used, whereas smart cards require an additional card reader. One-time password generators (OTP tokens) provide an alternative to certificates. OTPs are available in various form factors: hardware ... Making your systems really secure can be a bit more complicated than resorting to the use of regular passwords. In this article, we provide an overview of authentication solutions and present
22%
Forensic Analysis on Linux
30.04.2013
Home »  Articles  » 
In computer forensics, memory analysis is becoming increasingly important as a means for investigating security incidents. In this article, we provide an overview of the various memory dumping ... to a resurgence of interest in Linux RAM analysis. In this article, I describe some popular tools for RAM analysis in Linux and provide an example showing how to look for intruders with the versatile Volatility ... In computer forensics, memory analysis is becoming increasingly important as a means for investigating security incidents. In this article, we provide an overview of the various memory dumping
22%
Web Cryptography API
26.11.2013
Home »  Articles  » 
The controversial Web Cryptography API offers flexible encryption for web applications, but it also lays the groundwork for content providers to implement more powerful access restrictions through ... }; 21 }; 22 }; 23 }; The configuration object in lines 1-7 provides information for generating a key pair in the call to generateKey() (line 14): The name field selects a variant of the RSA ... The controversial Web Cryptography API offers flexible encryption for web applications, but it also lays the groundwork for content providers to implement more powerful access restrictions through
22%
System temperature as a dimension  of  performance
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Lead Image © Lucy Baldwin, 123RF.com
to access the state of the VideoCore GPU found on all Raspberry Pi boards [3]. It can also provide insight into voltage levels for cores and SDRAM, among other things, which can come handy while ... Sensor tools can provide highly variable data from CPUs, GPUs, and a variety of sources. We look at some tools to verify the temperature of components on diverse hardware.
22%
News for Admins
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
 
, developers, and other users by providing a platform to fully manage end-to-end machine learning development lifecycles, which includes data prep, deployment, experiment tracking, creating reproducible runs ... In the news: MLflow Project Joins the Linux Foundation; Hetzner Cloud Provider Adds Load Balancers; Linux 5.8 Kernel Gains a Notification Queue; and Russian Hacking Operation Underway.
21%
Bringing old hardware back into the game
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Lucy Baldwin, 123RF.com
entirely, if needed, retrofitting a wholly new system in place when an upgrade warrants it. Upgrading a laptop sets a higher bar and has become essentially impossible in the current era of ultrabook ... We show you how to build a compact, single-task device – if you dare to crack open an old laptop.
21%
MS Exchange to Open-Xchange Migration Service
01.10.2013
Home »  News  » 
 
is intended for Internet providers who subcontract cloud services for email and groupware and wish to change groupware providers with minimal interruption to service. The philosophy is that an easier and more ... Audriga's new tool is designed to encourage competition among groupware providers.
21%
Dell Inks Deal for Ausie HPC Cloud
30.07.2013
Home »  HPC  »  News  » 
 
Dell has reportedly signed an agreement to provide a 3,200-core HPC system for the Australian National Computational Infrastructure (NCI). The system will deliver cloud-based HPC computing on ... New system will provide cloud-based HPC for research institutions.
21%
COVID-19 HPC Consortium Seeks Resource Requests
15.04.2020
Home »  HPC  »  News  » 
 
modeling, and other related fields. The consortium will provide supercomputer time, collaboration, and other support services for projects that seek to expand our knowledge of COVID-19 and available ... Group aims to provide HPC resources for researchers with worthy proposals for coronavirus study.

« Previous 1 2 3 4 5 6 7 8 9 10 11 ... 200 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice