Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (833)
  • Article (178)
  • News (109)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 62 63 64 65 66 67 68 69 70 71 72 73 74 75 ... 113 Next »

10%
Changes in Exchange Server 2013
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Alessandro Russo, 123RF.com
true of virtual servers. The problem is due to TCP Chimney Offload and Receive-Side Scaling because the functions here are computed for the CPU, not the network card. You can resolve the problem
10%
Create secure simple containers with the systemd tools Nspawnd and Portabled
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Ian Taylor on Unsplash
logically separate individual parts of the system (Figure 2). A network namespace, for example, lets you create virtual network cards without giving them direct access to the physical NICs of the host
10%
Service mesh for Kubernetes microservices
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image by Ricardo Gomez Angel on Unsplash.com
, Consul, or simply running it with services that run directly on virtual or physical servers). You might choose Istio if you want a comprehensive set of control plane features that you can extend by means
10%
FreeRADIUS for WiFi Hotspots
15.04.2014
Home »  Articles  » 
. Each listen block represents a virtual server instance; the preset contains two of them – one for authentication and one for the accounting server. Use the previously mentioned standard ports and accept
10%
DBaaS – How They Make Data Scale
25.06.2012
Home »  Articles  » 
 
-driven deployment vs. virtual appliances, and you’re talking about a pure software view of what a system is. Of course, it is software. We can provision virtual machines via an API call. What shall we call it now
10%
DBaaS – How They Make Data Scale
25.06.2012
Home »  CloudAge  »  Blogs  »  Dan Frost's Blog  » 
 
are going to be headed,” Jilk responds, “but it’s very far off. We’ve got a long way to go. We’re still fighting the battle of model-driven deployment vs. virtual appliances, and you’re talking about a pure
10%
PowerTOP
21.10.2011
Home »  Articles  » 
 
: The Tunables tab contains a list of power-saving tips in PowerTOP 2.0. Note that VM in the first tip stands for virtual memory, not virtual machine. Conclusions Depending on your Linux system, Power
10%
REMORA
18.09.2017
Home »  HPC  »  Articles  » 
the memory used by the application. RMEM: Resident memory – physical memory used by the application. RMEM (Max): Maximum resident memory. VMEM: Virtual memory (important to watch if the OOM killer
10%
Run One Program at any Scale with Legate
08.06.2021
Home »  HPC  »  Articles  » 
for running code, although porting functions to use multiple GPUs requires work. CuPy is even adding functions from SciPy to its codebase. As with NumPy, CuPy is open source. CuPy code looks virtually
10%
Determining CPU Utilization
25.02.2016
Home »  HPC  »  Articles  » 
another event with an effect on CPU utilization is virtualization. Virtualization can introduce more complexity into the problem of CPU utilization because allocation of work to the various cores

« Previous 1 ... 62 63 64 65 66 67 68 69 70 71 72 73 74 75 ... 113 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice