Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (608)
  • Article (145)
  • News (12)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 64 65 66 67 68 69 70 71 72 73 74 75 76 77 Next »

13%
A Container for HPC
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © orson, 123RF.com
Scientific Computing Center (NERSC) [11]. Shifter is a prototype implementation of a container system for HPC that converts images from Docker, VMs, or CHOS [12] (a utility that creates a Scientific Linux
13%
Network access control with Cisco's Identity Services Engine
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Keith Hardy on Unsplash
a redundant power supply or hard disks. Its Intel Xeon 4110 processor has eight CPU cores and 32GB of RAM. Its bigger siblings, the SNS 3655 and SNS 3695, come with 12 CPU cores on the Intel Xeon 4116 CPU
13%
The next generation of Internet connectivity
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
ktsdesign, 123RF.com
-type traffic, as well as for the local link address (i.e., good old 127.0.0.1). Getting IPv6 Connectivity You can get IPv6 connectivity in several ways: native IPv6 access, IPv6 tunnels, Teredo (Miredo on Unix
13%
Forensic Analysis on Linux
30.04.2013
Home »  Articles  » 
the /dev/ pmem pseudodevice, which you can leverage to dump the memory content with dd . Figure 1 shows the complete process for an Ubuntu 12.04.1 LTS system
13%
Many Clouds, One API
22.08.2011
Home »  Articles  » 
 
[inst.id] = inst.state 08 summary[inst.state] += 1 09 state 10 end 11 total = summary.values.inject(0) { |sum, i| sum += i } 12 puts "Found #{total} instances in the following states:" 13 summary
13%
Benchmarks Don’t Have to Be Evil
12.03.2015
Home »  HPC  »  Articles  » 
 time:           5.245 seconds     iter    1   iter    5   iter   10   iter   15   iter   20    Benchmark completed  VERIFICATION SUCCESSFUL  L2 Norm is  0.5706732285739E-06  Error is    0.1345119360807E-12      MG
13%
Transport Encryption with DANE and DNSSEC
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © nerhuz, 123RF.com
RR can be removed as soon as its DNS time to live (TTL) has expired. Listing 2 Fingerprint in the TLSA RR $ dig TLSA _25._tcp.mail.sys4.de +short 3 0 1 9273B4E9040C1B9EE7C946EFC0BA8AAF2C
13%
Using benchmarks to your advantage
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Tom De Spiegelaere, 123RF.com
Initialization time: 5.245 seconds iter 1 iter 5 iter 10 iter 15 iter 20 Benchmark completed VERIFICATION SUCCESSFUL L2 Norm is 0.5706732285739E-06 Error is 0.1345119360807E
13%
A TurnKey Linux software evaluation platform
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Orlando Rosu, 123RF.com
with TurnKey Linux TurnKey Linux version 13.0 has been available since August 2014. All TKL appliances have been based on Debian since version 12.0; whereas previous versions were based on Ubuntu
13%
Relational databases as containers
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © James Thew, 123RF.com
databases in the market [11] is strong. Also, specialized container implementations like Shifter [12] or Singularity [13] are not covered in this article, because they play a subordinate role in the context

« Previous 1 ... 64 65 66 67 68 69 70 71 72 73 74 75 76 77 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice