Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: brain causing -(liทe@248fvcen)-สูตรหวยออนไลน์.wco ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1075)
  • Article (285)
  • News (93)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 44 45 46 47 48 49 50 51 52 53 54 55 56 57 ... 146 Next »

25%
Run One Program at any Scale with Legate
08.06.2021
Home »  HPC  »  Articles  » 
Py code, but just in case you have not, this quick example creates an “empty” 2D array of size nx by ny : import numpy as np nx = 10 ny = 10 a = np.empty((nx,ny)) type(a) Array a is of data type numpy
25%
Updates and Upgrades in HPC
15.05.2023
Home »  HPC  »  Articles  » 
“almost always compatible” because in some cases a package maintainer introduces a minor package update that breaks compatibility. I’m sure the maintainer’s goal was not to do this, but it does happen
25%
DIME and Dark Mail seek to change the world of digital mail
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © Orlando Rosu, 123RF.com
was renamed DIME, which stands for Dark Internet Mail Environment. As you can see from this name, DIME is not looking to be just an email add-on for more security, which is the case with GnuPG. The Whole
25%
Blending Java with other programming languages
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Ivan Mikhaylov, 123RF.com
. This is still the case with complex enterprise applications based on J2EE. Integration capability: Java applications can act as one component in the greater context and may need to adapt to match the look
25%
An Active Directory management solution for everyone
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Vlad Kochelaevskiy, 123RF.com
2 – without any problems in all cases. After installation, all employees can work with ADManager in the browser. Here, too, we did not encounter any problems in the course of our tests, regardless
25%
Optimization and standardization of PowerShell scripts
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Kheng Ho Toh, 123rf.com
and function of a value from the name). Two solutions for script naming normalization – upper CamelCase and Hungarian notation – solve these two problems. Upper CamelCase assumes that names usually comprise
25%
Resource Management with Slurm
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Vladislav Kochelaevs, fotolia.com
node in the cluster has a daemon running, which in this case is named slurmd. The resources are referred to as nodes. The daemons can communicate in a hierarchical fashion that accommodates fault
25%
Identity and access management with OpenIAM
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Chatree Jaiyangyuen, 123rf.com
user interface, which allows developers to extend the software according to their own requirements or to link it with external tools. User Provisioning with Connectors In a typical IAM use case
25%
Build system images with Kiwi
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © chachar, 123RF.com
or for installing on a bare metal system. In the latter case, the tool copies the configured system image directly to the local storage medium so that it is immediately ready for use the next time the hardware
25%
Back up virtual machines and clusters
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © ximagination, fotolia.com
2016 and 2019, a feature that allows backup software to detect which data has changed on the virtual disks since the last full backup so that only the changed data is saved. In this case, the virtual

« Previous 1 ... 44 45 46 47 48 49 50 51 52 53 54 55 56 57 ... 146 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice