Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: brain causing -(liทe@248fvcen)-สูตรหวยออนไลน์.wco ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1077)
  • Article (285)
  • News (93)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 48 49 50 51 52 53 54 55 56 57 58 59 60 61 ... 146 Next »

25%
Maatkit tools for database administrators
17.06.2011
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
 
]. You can install Maatkit with just a couple of keystrokes. Many package repositories include the tool selection, but, if this is not the case with your distribution, you can download the source code
25%
Hardening SSH authentication to the max
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © shutter999, 123RF.com
that you can scan with Google Authenticator, as well as some emergency codes. In principle, the QR code should also work with other TOTP programs, such as KeePassXC. In this case, you need to copy
25%
Supercharge Your Website with Amazon CloudFront
01.04.2014
Home »  Articles  » 
 
on a simple way to improve WordPress performance via caching and a Content Delivery Network (CDN). Caching/CDN-Powered WordPress In the case of WordPress, a key performance factor is that pages, posts
25%
Live Migration
18.02.2014
Home »  Articles  » 
the box, and in many cases even offer a GUI option for point-and-click live migration. The technical backgrounds of most of these solutions are the same. The virtualization solution copies the content
25%
MapReduce and Hadoop
27.02.2012
Home »  HPC  »  Articles  » 
with the corresponding page as the key and a list of 1 s as the value. The reducer then applies the reduce function to each of these pairs. In this case, it simply needs to add up the number of 1 s in the list
25%
SmartOS: Cool Cloud Platform Rises from the Ashes of Solaris
10.06.2014
Home »  Articles  » 
. However, Zones normally restrict you to the host operating system, even through branded Zones with Linux already existed in Solaris. In any case, full virtualization with KVM offers more options for running
25%
TinyDNS
02.03.2012
Home »  Articles  » 
 
businesses historically have relied on BIND – in some cases, for decades. Hieroglyphics If you’re used to BIND, then the layout and formatting of the TinyDNS config files are not for the infirm. To get past
25%
GlusterFS
27.03.2012
Home »  HPC  »  Articles  » 
network configuration. When the volume appears below /mnt/glusterfs , you can start to populate it with files. GlusterFS will distribute the files randomly across the individual bricks – in this case
25%
Forensic Analysis on Linux
30.04.2013
Home »  Articles  » 
processes or active network connections. Tapping into RAM is especially important for countering anti-forensics techniques. In some cases, it is possible to extract the passphrase for an encrypted drive from
25%
Exploring the HPC Toolbox
04.11.2011
Home »  HPC  »  Articles  » 
. In the simplest case, you can just use legacy Ethernet – and this is the approach used with the early Beowulf clusters. Although Ethernet can achieve data rates of up to 10GB per second, the latency values (i

« Previous 1 ... 48 49 50 51 52 53 54 55 56 57 58 59 60 61 ... 146 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice