Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (52)
  • Article (25)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 Next »

14%
Developing RESTful APIs
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © bowie15, 123RF.com
available [6]-[8]. An API will integrate in a far better way if it behaves as expected or in a known way. To match the identifiers closely, you then select the media types, often with the need to iterate
14%
Getting the most from your cores
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © ktsdesign, 123RF.com
lines of Python. The psutil documentation [6] discusses several functions for gathering CPU stats, particularly CPU times and percentages. Moreover, these statistics can be gathered with user
14%
Managing Active Directory sites and subnets
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Allan Swart, 123RF.com
and assign them to the respective sites. To create a new subnet, right-click Subnets in the snap-in and select New Subnet from the context menu. If desired, you can create IPv6 subnets. After you create
14%
News for Admins
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
 
is, the fewer vulnerabilities it is likely to have. According to the report, container images smaller than 100MB had 4.4 high or critical vulnerabilities, versus 42.2 for images between 250 and 500MB
14%
Exploring OpenShift – Red Hat's next-generation PaaS tool
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
(C) Markus Feilner, CC-BY-SA 4.0
> \ jboss-dv-6.0.0 35 JBoss Enterprise Application Platform 6 rhc create-app \ jbosseap-6 36 JBoss Unified Push Server 1.0.0.Beta1 rhc create
14%
Embarrassingly parallel computation
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Lucy Baldwin, 123RF.com
Laboratory hosts a number of excellent parallel programming tutorials at its Leadership Computing Facility, including one demonstrating the Monte Carlo method in both serial and parallel implementations [6]. I
14%
HDF5 and Parallel I/O
17.05.2017
Home »  HPC  »  Articles  » 
       USE HDF5 ! This module contains all necessary modules 5       IMPLICIT NONE 6 7       INCLUDE 'mpif.h' 8 9       INTEGER :: NUMTASKS, MPI_RANK, LEN, IERR , MPIERROR, INFO, C_LEN 10      INTEGER
14%
Have a Bash with the Zing network utility
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Micah Tindell on Unsplash
of the number of ports, the count, and the limit of the operation. The defaults are ports = 2, count = 6, and limit = 4, so the product, 2x6x4=48, is the total number of netcat operations. The fourth and final
13%
Troubleshooting and analyzing VoIP networks
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Ioannis Kounadeas, Fotolia.com
PCM 48, 56, 64 G.723.1 MP-MLQ/ACELP 5.3, 6.3 H.728 LD-CELP 16 G.729 CS-ACELP 8 G.729 annex A CS-ACELP 8
13%
Hardware MFA: Death to the password!
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © alphaspirit, 123RF.com
now easily and securely access your AWS resources with MFA enabled. Gemalto offers two supported devices. The Ezio Time-based 6-Digit Token

« Previous 1 2 3 4 5 6 7 8 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice