Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (919)
  • Article (281)
  • News (69)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 48 49 50 51 52 53 54 55 56 57 58 59 60 61 ... 128 Next »

16%
Environment Modules Using Lmod
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Federico Caputo, 123RF.com
.1), the latest Intel compiler, the last three community versions of the PGI compilers, three versions of MPICH (3.2.1, 3.1.4, and 3.1), and three versions of Open MPI (2.1, 3.0, and 3.1). Furthermore, assume your
16%
Stopping Side Channel Attacks
16.10.2012
Home »  Articles  » 
 
as shown in the following listing. Apache/2.2.16 (Debian) DAV/2 SVN/1.6.12 mod_fcgid/2.3.6 Phusion_Passenger/3.0.11 mod_ssl/2.2.16 OpenSSL/0.9.8o Server at www.domain.tld Port 80 Treacherous Error Messages
16%
Network performance in the world's favorite data center
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Lucy Baldwin, 123RF.com
attached. The maximum number of network devices that can be attached depends on the instance type, but it is safe to assume that current instance types (except T2 and M3) all support enhanced networking
16%
Fedora 18 for Admins
11.06.2013
Home »  Articles  » 
 
” according to the assessments after the first tests hardly helped improve the situation. However, this criticism relates primarily to desktop use, and in particular to errors in the new Gnome version 3
16%
Credential harvesting at the network interstice
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Galyna Andrushko, 123RF
by the browser. Anatomy of a Web Session Figure 3 provides a quick overview of a typical web session. To conduct a brute force attack, all you need to learn is the exact sequence and syntax used
16%
Parallel Python with Joblib
08.04.2014
Home »  HPC  »  Articles  » 
| elapsed: 0.0s remaining: 4.5s [Parallel(n_jobs=2)]: Done 198 out of 1000 | elapsed: 1.2s remaining: 4.8s [Parallel(n_jobs=2)]: Done 399 out of 1000 | elapsed: 2.3s remaining: 3.5s
16%
PowerShell Part 2: Manipulating Services, Processes, and Commands
17.04.2012
Home »  Articles  » 
 
and Windows Server 8 use the new PowerShell 3.0 that I’ll cover in a later entry. Starting and Stopping Services One of the basic duties of an Administrator is to start, stop, and restart services on systems
16%
Correctly integrating containers
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Beboy, Fotolia.com
and DHCP, among other things. Listing 2 CNI Configuration 01 [...] 02 { 03 "cniVersion": "0.3.1", 04 "name": "dbnet", 05 "type": "bridge", 06 // type (plugin) specific 07 "bridge
16%
Tools that extend Bash scripting
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Laschon Maximilian, 123RF.com
that the top left of the screen is (0,0) tput cup 3 15 # Set the foreground color using an ASCII escape tput setaf 3 # Write a "title" to the screen echo "Title of the company" tput sgr0 # Write a menu title
16%
Data Analysis with Panda
12.03.2014
Home »  HPC  »  Articles  » 
an integer argument, it creates an array of that length, initializing the values with a stepped sequence: In: np.arange(3) Out: array([0, 1, 2]) The arange() method optionally takes additional arguments

« Previous 1 ... 48 49 50 51 52 53 54 55 56 57 58 59 60 61 ... 128 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice