Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcomm%3 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (316)
  • Article (119)
  • News (3)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 37 38 39 40 41 42 43 44

60%
Linux Writecache
19.11.2019
Home »  HPC  »  Articles  » 
Zhao through his summer internship at IBM research. The dm-cache  module was integrated into the Linux kernel tree as of version 3.9. It is an all-purpose caching module and is written and designed
60%
Six emergency CDs from antivirus manufacturers
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Karsten Winegeart on Unsplash
both from an optical data carrier or from a USB memory stick. Start The system, based on Ubuntu 20.04.1 and equipped with a fairly up to date 5.8 kernel, first boots into a graphical GRUB screen
60%
Parallel and Encrypted Compression
09.12.2021
Home »  HPC  »  Articles  » 
 falls between the switch and the number of threads.) Both the compression and decompression capabilities should be multithreaded. pzstd The parallel version of zstd  is pzstd . On my Ubuntu 20.04 system, pzstd  was
60%
Azure Sphere for Internet of Things
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Zosia Korcz on Unsplash
not manufacture this kind of hardware but works with third-party suppliers that manufacture devices to spec. Several compatible devices from various manufacturers can be found on the market [3]. The core of all
60%
Windows Server 2012 Tricks
27.05.2013
Home »  Articles  » 
 
virtual servers. They use the individual virtual switches of the Hyper-V host as their basis. Trick 3: Virtual Domain Controller – Cloning and Snapshots In Windows Server 2012, Microsoft has optimized
60%
Discovering indicators of compromise
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Jakob Owens on Unsplash
to identify an essential principle of the security analyst: As an attack occurs, certain things are left behind. This concept was first articulated by Edmond Locard [3] almost 100 years ago, well before
60%
The 12 best tricks for Windows Server 2012
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Graphic Designer, Fotolia.com
virtual servers. They use the individual virtual switches of the Hyper-V host as their basis. Trick 3 Virtual Domain Controller -- Cloning and Snapshots In Windows Server 2012, Microsoft has optimized
60%
Vulnerability assessment best practices for enterprises
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Photo by Fancycrave on Unsplash
). Figure 1: Articulated as a mathematical formula, Risk = Threat x Vulnerability x Cost of Asset. Clear Guidance VA activities must have acceptance from the highest levels of an organization
59%
Storage trends for taming the flood of data
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © Natalia Lukiyanova, 123RF.com
kernel, in the cross-platform xNVMe tools starting at version 0.7, in the free Qemu hardware simulator starting at version 8.0, and in nvme-cli, the NVMe command line. Further implementations are underway

« Previous 1 ... 37 38 39 40 41 42 43 44

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice