Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (140)
  • Article (49)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 ... 19 Next »

30%
Visualizing time series data
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Maxim Kazmin, 123RF.com
} 'a'..'c'; 12 13 $s .= $one; 14 $s .= $two; 15 $s .= $three; 16 17 my $temp; 18 for (my $i=0; $i<12288; $i++) { 19 $temp=substr($s,length($s)-1,1); 20 $s=$temp.$s; 21 $s = substr($s,0
30%
Network Grep
26.11.2012
Home »  Articles  » 
 
to your command lines. If you’re concerned about email traffic and need to watch all TCP traffic closely using the SMTP port, then you could construct a command line such as: # ngrep -d any port 25 Here
30%
Warewulf 4 – Time and Resource Management
17.01.2023
Home »  HPC  »  Articles  » 
:  ohpc-slurm-client          x86_64 2.6-7.1.ohpc.2.6                      OpenHPC-updates 6.9 k Installing dependencies:  cairo                      x86_64 1.15.12-6.el8                         appstream
30%
Building a HPC cluster with Warewulf 4
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Andrew Ly on Unsplash
: ohpc-slurm-client x86_64 2.6-7.1.ohpc.2.6 OpenHPC-updates 6.9 k Installing dependencies: cairo x86_64 1.15.12-6.el8 appstream
30%
Cross-Vendor IPsec
25.10.2011
Home »  Articles  » 
 
} 11 } 12 from-zone trust to-zone vpn { 13 match { 14 source-address trustnet; 15 destination-address remotelan; 16 application any; 17 } 18 then { 19 permit; 20
30%
Modern Fortran for today and tomorrow
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © homestudio, 123RF.com
(my_struct), dimension(10) :: data_array 25 26 end program struct_test To access a specific part or member of a derived type, you simply use a percent sign (%), as shown in line 20. You can also make an allocatable
30%
Exploring dhcpy6d, a DHCP server for IPv6 networks
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Paul Herbert, 123RF.com
2001:db8::201:203:409 prefixlen 64 scopeid 0x0 inet6 2001:db8::5555 prefixlen 64 scopeid 0x0 inet6 fe80::1:2ff:fe03:409 prefixlen 64 scopeid 0x20 ether 02
30%
Profiling application resource usage
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© fauxware, fotolia.com
Franklin Some big changes are happening in the processor world right now. For the past 15 years or so, both the HPC world and the enterprise world have settled on, for the most part, x86 as the processor
30%
Static code analysis finds avoidable errors
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Andrey KOTKO, 123RF.com
constraint: requires maxRead(argv[1] @ example1.c:8:20) <= 9 needed to satisfy precondition: requires maxSet(buffer @ example1.c:8:12) >= maxRead(argv[1] @ example1.c:8:20) derived from
30%
Using rsync for Backups
07.01.2014
Home »  Articles  » 
 
of space (20 + 25 + 30), with no doubt lots of duplicated data wasting space and money. The backup world uses a few techniques that differentiate it from replication. The first is called a “full backup

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 ... 19 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice