Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (502)
  • Article (140)
  • News (12)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 46 47 48 49 50 51 52 53 54 55 56 57 58 59 ... 66 Next »

11%
Multiprocessing in Python with Fortran and OpenMP
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image Photo by Zachary Young on Unsplash
as Python modules with tools such as SWIG [6], Pyfort [7], and F2PY [8]. Writing parallel functions in Python is very difficult, but it's fairly straightforward in C and Fortran with the use of a variety
11%
Encrypting files
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Yoichi Shimizu, 123RF.com
, the encryption is very good if used correctly, the code is open source, and it follows the OpenPGP specification [5], which is also an IETF standard [6]. GPG was really designed as a command-line encryption tool
11%
Manage software apps publicly and privately
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Akurhan, 123RF.com
msstore Search repo(s) for matching packages by nameLimit search to a particular package source list ls winget listwinget list - n 12winget list --upgrade-availablewinget list
11%
Novell Filr 1.0 tested
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Illustrator, 123RF.com
integrate existing data sources that are accessible via SMB/CIFS or Novell Core Protocol (NCP), for example, on Windows 2003/2008, Novell Open Enterprise 11 (OES), and NetWare 6.5.8 servers with at least one
11%
Secure access to Kubernetes
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Zachery Blanton, 123RF.com
. Listing 1 kube-system Namespace Pods $ kubectl get pods -n kube-system NAME READY STATUS RESTARTS AGE coredns-5644d7b6d9-7n5qq 1/1 Running 1
11%
Forensic Tools
04.02.2014
Home »  Articles  » 
 
and postmortem analysis. For this comparison, we looked at version 1.2 (build 1003); version 2.0 has been released in the meantime (build 1003). Forensic duplication is implemented as an additional virtual disk
11%
An IP-based load balancing solution
21.07.2011
Home »  CloudAge  »  Articles  » 
 
heartbeat = 1 07 heartbeat_port = 539 08 keepalive = 6 09 deadtime = 18 10 network = direct 11 debug_level = NONE 12 monitor_links = 1 13 syncdaemon = 1 14 virtual webs.test.com { 15 active = 1 16
11%
Desktop Blades (of Glory)
06.05.2024
Home »  HPC  »  Articles  » 
Express Gen 2 one-lane (x1), 40-pin set of GPIO pins, camera connector, and so on. All of these connectors were linked to the chips on the Compute Module 4. The CM4 measured 55x40x4.7mm (i.e., about 2.1x1.6
11%
Monitoring container clusters with Prometheus
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Guido Vrola, 123RF.com
) [12], introduced in Kubernetes 1.6, that can be used with Prometheus. Name Tag Kubernetes uses namespaces to isolate the resources of individual users or a group of users from one another
11%
Automated orchestration of a horizontally scalable build pipeline
15.02.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
© Kittipong Jirasukhanont, 123RF
) Docker Swarm VirtualBox v5.2.6 r120293 (Qt5.6.1) Vagrant v2.0.1 Ansible v2.1.0.0 For readers who are unfamiliar with Jenkins, a tutorial is outside the scope

« Previous 1 ... 46 47 48 49 50 51 52 53 54 55 56 57 58 59 ... 66 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice