Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (463)
  • Article (74)
  • News (4)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 43 44 45 46 47 48 49 50 51 52 53 54 55 Next »

17%
Serverless computing with AWS Lambda
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © joingate, 123RF.com
Management Console [3] Lambda service page with an orange Create function button. Figure 1: The page where you will create a Lambda function. If you
17%
Managing Linux Memory
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © J.R. Bale, 123RF.com
systems, distinguishes between virtual memory, which the operating system and applications see, and physical memory, which is provided by the hardware of the machine, the virtualizer, or both [2] [3]. Both
17%
Proactive Monitoring
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Tom Wang, 123RF.com
. The problem is well known [3] and should be fixed in the next release. Because the index resides in volatile memory, stopping and then restarting is not a good idea. As an interim solution, you can send kill
17%
Monitoring for small and medium-sized companies compared
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
, POP3, or DNS. Thanks to its integrated SNMP trap and Syslog receiver, OpenNMS is capable of implementing centralized logging. Performance data can be collected via SNMP, WMI, HTTP, JMX, JDBC
17%
Build operating system images on demand
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © Nataliya Hora, 123RF.com
subpages on the FAI website for cloud images [3] and bare metal [4]. Both pages are quite straightforward. Clouds If you look at the cloud page, you only have a few – really important – parameters to set
17%
Darshan I/O Analysis for Deep Learning Frameworks
18.08.2021
Home »  HPC  »  Articles  » 
, the command I used for Darshan to gather I/O statistics on the application was: env LD_PRELOAD=/home/laytonjb/bin/darshan-3.3.1/lib/libdarshan.so ./ex1 I copied the Darshan file from the log location
17%
Tuning I/O Patterns in Python
18.12.2013
Home »  HPC  »  Articles  » 
(One-by-One) 1 #include 2 3 /* Our structure */ 4 struct rec 5 { 6 int x,y,z; 7 float value; 8 }; 9 10 int main() 11 { 12 int counter; 13 struct rec my_record; 14 int counter_limit; 15
17%
Supercharge your software upgrade routine
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Photo by redcharlie on Unsplash
repositories. The most noble distribution that had picked up on this nifty tool was openSUSE [3]. Today, you can install it either with the usual git clone command or by going through a somewhat easier approach
17%
SMART Devices
14.08.2020
Home »  HPC  »  Articles  » 
of the failed drives.” Temperature effects are interesting, in that high temperatures start affecting older drives (3–4 years old or older), but lower temperatures can also increase the failure rate of drives
17%
Application security testing with ZAP in a Docker container
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Maxim Maksutov, 123RF.com
a family of wasps [2]. Although I'm a fan of Mutillidae, other applications like WebGoat [3], also from OWASP, offer a highly sophisticated and multilayered insecure web application, as well. The most

« Previous 1 ... 43 44 45 46 47 48 49 50 51 52 53 54 55 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice