Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (377)
  • Article (122)
  • News (23)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 35 36 37 38 39 40 41 42 43 44 45 46 47 48 ... 53 Next »

28%
DDoS protection in the cloud
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Amy Walters, 123RF.com
to try to fend off an attack with 100GBps bandwidth on a 1 or 10GBps link. Until a corresponding filter protects the internal infrastructure, the line is already overloaded. Although the attack does
28%
The RADOS object store and Ceph filesystem: Part 2
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Kateryna Pruchkovska, 123RF.com
map for a setup consisting of six OSDs (i.e., individual storage devices in servers) distributed over three racks: crushtool --num_osds 6 -o crush.example.map --build host straw 1 rack straw 2 root
28%
Scale-out with PostgreSQL
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Alberto Andrei Rosu, 123RF.com
to sorted sequence table (SST) files as soon as it reaches a certain size (128MB by default), creating many SST files with all intermediate versions. To limit the amount of data, these files are compressed
27%
Security data analytics and visualization with R
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Rancz Andrei, 123RF.com
and document the evidence Principle 6: Content is king The subtext of each of these principles is that a graphic should tell a complete, credible story while recognizing that "analytical presentations
27%
CloudStack's Chip Childers
29.10.2013
Home »  Articles  » 
 
, but with Apache CloudMonkey 5.0.0, the CLI can actually query the API endpoint of the target cloud and automatically discover the capabilities of that environment. Apache CloudStack 4.2 and will be out by the time
27%
Moore's Law Continues its Unwavering March
09.10.2013
Home »  HPC  »  Articles  » 
, and the Gigabit Ethernet interface onboard promises tantalizing cluster possibilities – the team has already demonstrated a 756-core cluster, powering 42 boards with less than 500 watts. As Adapteva perfects its 64
27%
Secret Sauce
09.11.2017
Home »  Articles  » 
. There are a few differences, so a developer has to go in and tweak the remaining 1%.” The ROCm developers recently converted the CUDA-based Caffe machine learning library to HIP and found that 99.6% of the 55
27%
News for admins
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
 
of all IT infrastructure money is now spent on the cloud. The Worldwide Quarterly Cloud IT Infrastructure Tracker says a total of $7.6 billion was spent in the third quarter of 2015. The total cloud
27%
News for Admins
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
 
." The new lineup consists of the AX41 and AX41-NVME, which are based on the Ryzen 5 3600 CPU (with 6 cores and 12 threads), and can be combined with either two 2TB HDDs or two 512GB NVMe SSDs. Each of those
27%
News for Admins
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
 
Citrix about an attack on March 6. If a major player like Citrix is unaware of any such attack, what chance does an average company have to learn about similar attacks? Citrix also didn't tell when

« Previous 1 ... 35 36 37 38 39 40 41 42 43 44 45 46 47 48 ... 53 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice