Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1081)
  • Article (302)
  • News (160)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 56 57 58 59 60 61 62 63 64 65 66 67 68 69 ... 155 Next »

10%
Serverless computing with AWS Lambda
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © joingate, 123RF.com
Id: 4e90b424-95d9-4453-a2f4-8f5259f5f263 Duration: 70.72 ms Billed Duration: 100 ms Memory Size: 128 MB Max Memory Used: 55 MB Init Duration: 129.20 ms More or Less
10%
Tuning SSD RAID for optimal performance
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © ELEN, Fotolia.com
to form a page (e.g., 8KB). Several pages then form a block (~2MB). At this level, the first peculiarity of flash memory already comes to light: Whereas new data can be written to unused pages, subsequent
10%
Secure cloud-native services with Prisma Cloud Compute
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © alexmillos, 123RF.com
754 pages of about 63MB) with details on where to find the latest release. In my case, this was version 19.11.480. The docs are also now public, which is more convenient (an access token attached
10%
A modern logging solution
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
instance on localhost. You can use the same [SERVICE] section as in Listing 5, setting the flush interval of five seconds and logging the events at the info level (Listing  6). Listing 6 Fluent
10%
Setting up SELinux policies
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Agustin Paz, 123RF.com
17 %description 18 Custom SELinux policy module. 19 20 %prep 21 if [ ! -d custom-selinux-policy ]; then 22 mkdir custom-selinux-policy 23 fi 24 cp -p %{SOURCE0} %{SOURCE1} %{SOURCE2} custom
10%
Exploring the Xeon Phi
05.11.2013
Home »  Articles  » 
cores (57, 60, or 61), memory size (6, 8, or 16GB), clock speed (1053, 1100, or 1238MHz), and cooling concept (active or passive). The basic architecture is the same for all cards: Like the Larrabee
10%
John the Ripper
22.08.2011
Home »  Articles  » 
 
systems is John the Ripper (John). John is a free tool from Openwall. System administrators should use John to perform internal password audits. It’s a small (<1MB) and simple-to-use password
10%
Automation with System Center 2012 R2 Orchestrator
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © skaisbon, photocase.com
SCO components on a single computer make sure you comply with the following hardware requirements: Minimum 1GB RAM, 2GB RAM recommended 200MB available hard disk space Dual-core processor
9%
President's 2017 Budget Increases HPC Spending by 50%
24.02.2016
Home »  HPC  »  News  » 
 
for Measurement Science for Future Computing Technologies and Applications, which sees an increase from $13.6 million to $25.6 million. The total discretionary spending for NIST is $1 billion. Of course
9%
Malicious XZ Attack Planned for Years
08.04.2024
Home »  News  » 
 
The malicious code recently discovered in versions 5.6.0 and 5.6.1 of XZ Utils “appears to be the product of a carefully crafted supply chain attack that took several years to set up,” reports

« Previous 1 ... 56 57 58 59 60 61 62 63 64 65 66 67 68 69 ... 155 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice