Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (953)
  • Article (264)
  • News (101)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 66 67 68 69 70 71 72 73 74 75 76 77 78 79 ... 133 Next »

16%
CoffeeScript: A Replacement for JavaScript?
05.03.2013
Home »  Articles  » 
 
the script hello.coffee, then the compiler translates it into JavaScript code. At this point, you will discover two minor pitfalls. First, the interpreter starts the node  program, which some
16%
Floodlight: Welcome to the World of Software-Defined Networking
15.10.2013
Home »  Articles  » 
supports the concept of separating the data and control paths, which lets a central control point oversee a variety of OpenFlow-enabled network components. The SDN controller could even be a distributed
16%
Cloud Forensics
03.02.2012
Home »  Articles  » 
 
pointed out as early as 2009 a lack of publications on the cloud security problem and on corresponding legal issues [1]. This paucity of information was confirmed by other publications [2] [3]. Despite this
16%
Stat-like Tools for Admins
19.11.2014
Home »  HPC  »  Articles  » 
, you have to rely on ASCII tools. However, I don't rely just on Top-like tools to help me diagnose a problem; rather, I use them as a starting point if I can get a login. Top tells me a little of what
16%
ClusterHAT
10.07.2017
Home »  HPC  »  Articles  » 
passwordless SSH and pdsh, a high-performance, parallel remote shell utility. MPI and GFortran will be installed for building MPI applications and testing. At this point, the ClusterHAT should be assembled
16%
OpenACC – Parallelizing Loops
09.01.2019
Home »  HPC  »  Articles  » 
 floating point operations per second [FLOPS]) at a rapid pace. Even though most systems aren’t Exascale, quite a few are at least Petascale (>1015 FLOPS) and use a large number of nodes. Programming
16%
What is an IOPS Really?
24.02.2022
Home »  HPC  »  Articles  » 
,024 bytes, so that 4KiB is 4,096 bytes. Therefore, the commonly used read or write payload is 4,096 bytes or 4KiB. Just to emphasize the point, whereas 4KiB commonly is used for IOPS measurements, IOPS has
16%
Performance Health Check
13.06.2022
Home »  HPC  »  Articles  » 
memory, or both. You can even run a single core if you like. In my opinion, the emphasis should be on testing an important aspect of performance: peak CPU or GPU floating point operations per second (FLOPS
16%
TCP Stealth hides open ports
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © momo5287, 123RF.com
Stealth can ensure data integrity (more on that later). At this point, it is important to note that a local attacker can sniff certain information because they are simply available in the clear
16%
Protecting documents with Azure Information Protection
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Aleksey Mnogosmyslov, 123RF.com
in which Office product the user typed the password string, it is always recognized, and the actions defined in the policy are applied. The client does not distinguish between a PowerPoint presentation

« Previous 1 ... 66 67 68 69 70 71 72 73 74 75 76 77 78 79 ... 133 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice