Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1339)
  • Article (364)
  • News (273)
  • Blog post (9)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 50 51 52 53 54 55 56 57 58 59 60 61 62 63 ... 199 Next »

8%
Distributed Linear Algebra with Apache Mahout
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Peter Galbraith, Fotolia.com
is an expert in the underlying engine will implement performant ways to do basic operations like multiplying two matrices, multiplying a matrix times itself transposed, and other operations. Figure 2 shows
8%
Infrastructure as Code with Terraform
20.06.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
© fotolia.com
to create environment variables (replace "KEY" and "SECRET-KEY"): $ export AWS_ACCESS_KEY_ID="KEY" ; export AWS_SECRET_ACCESS_KEY="SECRET-KEY" 2. You then want to download and unzip the Terraform binary
8%
Easy configuration management with Puppet
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Warangkana Bunyarittongchai, 123RF
. For example, configuring an Apache site might require the existence of the file /etc/apache2/sites-enabled/.conf, or you might want to make sure a module is configured as you desire: /etc/apache2/conf
8%
Asynchronous PostgreSQL
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Fesus Robert, 123RF.com
amount of computing time so that the associated process will assume one of the top positions in the top output. For testing, you can call the burncpu program with psql: r2=> select burncpu('30s
8%
Detecting and analyzing man-in-the-middle attacks
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Soner Eker on Unsplash
window (Figure 2). You can enable filters in the upper section to ensure that Wireshark lists only the data that interests you. Figure 2: Wireshark can
8%
Free Enterprise Backup with Bareos
12.11.2013
Home »  Articles  » 
). The current beta is version 13.2. On September 25, 2013, at the Open Source Backup Conference, formerly known as the Bacula Conference, the Bareos project was introduced to an interested audience. Before you
8%
TinyDNS
02.03.2012
Home »  Articles  » 
 
shows this for the MX entry: @domainname.com::mail.domainname.com:10:3600 If you ran a similar MX command again adding mail2 , you’d add a secondary MX with a different priority (a.k.a. delivery
8%
Understanding Privilege Escalation
13.12.2011
Home »  Articles  » 
 
2>/dev/null attached to each of the commands in Listing 1 removes those warnings from the output, making the report much easier to read and analyze. Listing 1: Example of basic information gathering
8%
OpenACC – Parallelizing Loops
09.01.2019
Home »  HPC  »  Articles  » 
of the loop, n , is large enough, some processing hardware can greatly speed up the computation. What happens if z(i)  depends on a previous value, as in the following: do i = 2,n    z(i) = z(i-1)*2 enddo
8%
Proprietary and Open Source Storage Options
09.10.2023
Home »  HPC  »  Articles  » 
the pattern, nvme[controller]n[device] where [ controller ]  is the number of the controller (e.g., 0 , 1 , 2 ) and [ device ]  is the device number (e.g., 0 , 1 , 2 ) on the controller. You can use

« Previous 1 ... 50 51 52 53 54 55 56 57 58 59 60 61 62 63 ... 199 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice