Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (245)
  • Article (100)
  • News (13)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 36 Next »

21%
TLS 1.3 and the return of common sense
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image Creative Commons CC0 TheDigitalArtist Pixabay
-RTT poses a threat to any application that runs in multiple zones but declines tickets issued in one zone (A) in any other of its zones (B, C, D, …). By sending a ClientHello and early data intended ... After a decade in service, TLS 1.2 is showing many signs of aging. Its immediate successor, TLS 1.3, has earned the approval of the IETF. Some major changes are on the way. ... TLS 1.3 ... TLS 1.3 and the return of common sense
21%
OpenACC – Data Management
07.02.2019
Home »  HPC  »  Articles  » 
exiting the data region, the data from the accelerator is copied back to the host. Table 3 shows a simple example of using the copy  clause. Table 3: The copy  Clause Fortran C !$acc data copy(a
21%
Aligning filesystem partitions
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Lucy Baldwin, 123RF.com
access is aligned to internal sector size, so that should be your first consideration. Without further data, the rule of thumb adopted by Microsoft in Windows 7 of aligning to 1MB (2048x512 and 256x4096
21%
Parallel and Encrypted Compression
09.12.2021
Home »  HPC  »  Articles  » 
 in Listing 6. Listing 6: gzip  and gpg $ gzip -9 -c package-list.txt | gpg --symmetric --cipher-algo aes256 -o secure.gz.gpg gpg: keybox '/home/laytonjb/.gnupg/pubring.kbx' created The command line pipes
21%
Hybrid public/private cloud
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Photo by JJ Ying on Unsplash
-06f4dce9c3ae2c504" # for eu-west-3 paris 07 InstanceType: t2.small 08 AvailabilityZone: !GetAtt FortiVPCFrontNet.AvailabilityZone 09 KeyName: 10 Ref: KeyName 11 Network
21%
How to configure and use jailed processes in FreeBSD
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Corina Rosu, 123RF.com
command: # sockstat | grep "\*:[0-9]" The description for rc.conf(5) lists the services that need to be bound to a fixed IP address via parameters. One example is the inetd service: inetd_flags="-wW -a
21%
Security data analytics and visualization with R
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Rancz Andrei, 123RF.com
of this attack, including a description, walk-through, and exploit is available at Exploit-DB [11]. Over the years, I've made use of a Perl script that reduces very long W3C Apache log entries down to just
21%
Saving Storage Space with Reduced Precision
19.06.2023
Home »  HPC  »  Articles  » 
128-bit complex floating-point complex256 c32 256-bit complex floating-point bool ? Boolean (True or False) unicode U Unicode string
21%
Benchmarking a new architecture
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Lead Image © Lucy Baldwin, 123RF.com
  Quad-core Xuantie C910   64KB+64KB data/instruction caches per core   1MB shared L2 cache GPU 50GFLOPS BXM-4-64 NPU 4TOPS INT8 at 1GHz
21%
I/O Profiling at the Block Level
27.08.2014
Home »  HPC  »  Articles  » 
was the sequential write test using 1MB record sizes: ./iozone -i 0 -c -e -w -r 1024k -s 32g -t 2 -+n > iozone_write_1.out To gather the block statistics, I ran ioprof in a different terminal window before I ran

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 36 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice