Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xsede 12 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (589)
  • Article (170)
  • News (84)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 46 47 48 49 50 51 52 53 54 55 56 57 58 59 ... 85 Next »

21%
Finding Your Way Around a GPU-Accelerated Cloud Environment
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © Lucy Baldwin, 123RF.com
, you need to find a load generator, because trusted standbys stress [9] and stress-ng [10] do not yet supply GPU stressors. Obvious choices include the glmark2 [11] and glxgears [12] graphic load
21%
Speed up your MySQL database
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Mikhail Dudarev, 123RF.com
_TIMESTAMP()), 'Row 2', NULL); SELECT SLEEP(1); 11 mysql> INSERT INTO data_random VALUES ( MD5(CURRENT_TIMESTAMP()), 'Row 3', NULL); SELECT SLEEP(1); 12 13 mysql> CREATE TABLE `data_time` ( 14 `id` INT(10) UNSIGNED
21%
New security features in Windows 10
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Duncan Andison, 123RF.com
, but Microsoft assumes many manufacturers will provide biometric hardware solutions in the next 12 months. The situation already looks better for fingerprint sensors. All available solutions are supported
21%
Security with PowerShell 5
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Fernando Gregory Milan, 123RF.com
the importance of Windows Remote Management and remote server maintenance or cloud service management. Infos JEA Helper Tool: https://blogs.technet.microsoft.com/privatecloud/2015/12/20/introducing
21%
Verifying packages with Debian's ReproducibleBuilds
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © jaroonrat vitoosuwan , 123RF.com
and understand the dependencies used in the snapshot archive package [12] if they are outdated. The experimental toolchain already works in a chrooted build environment, for example, with pbuilder [13]. Package
21%
Internet socket programming in Perl
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © higyou, 123RF.com
->can_read($timeout); 11 12 foreach $socket (@ok_to_read) { 13 $socket->recv($data_buffer, $flags) 14 print $data_buffer; 15 } The script starts by declaring the IO::Select module for use. A new instance
21%
SDN and the future of networking
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Stuart Miles, 123RF.com
by the manufacturer was, and unfortunately still is, a painful experience. SDN has appeared in tandem with Network Function Virtualization (NFV) [12] for some time. Both technologies are high on the list of topics
21%
This Linux hardware company puts the emphasis on freedom and privacy
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Image courtesy Swapnil Bhartiya
Weaver. "Timing could also be a factor. Canonical managed to raise only $12 million out of $32 million that they were asking for. At that time, it was not enough money because fabrication is expensive
21%
Meet the CTO of Red Hat
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Photo courtesy of Swapnil Bhartiya
to evolve and ended up working on the Linux kernel itself. Some 12 years ago when Red Hat was looking for virtualization expertise, he joined the company from Open Source Development Labs (OSDL). "Back then
21%
Container technology and work organization
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © lightwise, 123RF.com
of vulnerabilities in container images is a good example. Projects such as Clair [11] and Nautilus [12] have only recently developed the capacity for detecting vulnerabilities in container images (Figure 1

« Previous 1 ... 46 47 48 49 50 51 52 53 54 55 56 57 58 59 ... 85 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice