Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: bring calling -(liทe@248fvcen)-สูตรหวยออนไลน์.wco ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (879)
  • Article (252)
  • News (183)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 64 65 66 67 68 69 70 71 72 73 74 75 76 77 ... 132 Next »

15%
SHA-3 – The new hash standard
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Warakorn Harnprasop, 133RF.com
. The proposals were discussed at several conferences and investigated for potential vulnerabilities. Besides the obvious reasons, calls to pay more attention to the subject in general had become more insistent
15%
Living with multiple and many cores
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
these designs. The increase in frequency or "megahertz march," as it was called, started to create problems when processors approached 4GHz (109Hz, or cycles per second). In simple terms, processors were getting
15%
Linking Kubernetes clusters
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Lead Image © choreograph, 123RF.com
, which describes which of the contexts is the default if you do not specify one when calling kubectl. You can easily edit the file with a text editor or use kubectl to do so. The names used in the file
15%
Hardening SSH authentication to the max
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © shutter999, 123RF.com
modules (HSMs) on Android devices, or Trusted Platform Modules on a laptop. The term "discoverable credential" is so called, because the client can determine a list of possible keys in the authenticator
15%
Monitoring Memory Errors
17.09.2013
Home »  Articles  » 
 
what are called single-bit errors, and although it can detect double-bit errors, it cannot correct them. A simple flip of one bit in a byte can make a drastic difference in the value of the byte
15%
Generate VM Images with virt-builder
15.04.2014
Home »  Articles  » 
 
distribution, you can now create a new Fedora image with the call: ./run builder/virt-builder fedora-19 --output fedora19.img--hostname fedora19 This command tells the tool to generate a random root password
15%
Getting Started with HPC Clusters
05.06.2013
Home »  HPC  »  Articles  » 
in the video is that Amazon has created pre-configured images called “Amazon Machine Images” (AMIs). AMIs are a collection of pre-configured OS images for VMs that are primarily open source because of licensing
15%
Environment Modules
23.02.2012
Home »  HPC  »  Articles  » 
/local/Modules connecting the current version of Environment Modules to a directory called default : % cd /usr/local/Modules % sudo ln -s 3.2.6 default The reason they recommend using the symbolic link is that, if you
15%
Increasing Throughput with Link Aggregation
26.10.2012
Home »  Articles  » 
 
data from a conversation? The standard assigns that task to a so-called frame distributor. There are no hard and fast rules for how the frame distributor distributes the data. The only requirement
15%
Monitoring NFS Storage with nfsiostat
12.03.2013
Home »  HPC  »  Articles  » 
B_nor/s, rMB_nor) The number of blocks (kilobytes, megabytes) read by applications using the NFS mounted filesystem with the read(2) system call. A block has 512 bytes. In the example, I chose to use

« Previous 1 ... 64 65 66 67 68 69 70 71 72 73 74 75 76 77 ... 132 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice