Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (995)
  • Article (277)
  • News (260)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 67 68 69 70 71 72 73 74 75 76 77 78 79 80 ... 154 Next »

11%
Parallel Programming with OpenCL
04.11.2011
Home »  HPC  »  Articles  » 
. Compiling and Calling the Kernel The kernel source code must be compiled at run time by the OpenCL library. This is the only way to ensure platform-independence. I create a cl::Program object from
11%
Privacy Policy
24.05.2018
Home »  HPC  » 
 
. Cookies help make our website more user-friendly, efficient, and secure. Cookies are small text files that are stored on your computer and saved by your browser. Most of the cookies we use are so-called
11%
Privacy Policy
24.05.2018
Home » 
 
viruses. Cookies help make our website more user-friendly, efficient, and secure. Cookies are small text files that are stored on your computer and saved by your browser. Most of the cookies we use are so-called
11%
Implement your own MIBs with Python
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Name System (DNS) was invented. In the case of OIDs, so-called MIB modules – text files also often called MIBs – likewise assign a name to each numeric component of an OID. For example, the above OID
11%
Capsicum – Additional seasoning for FreeBSD
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
and processes and threads. Calls to system functions are also regulated in capability mode. Some features that have access to the global namespace are no longer available, whereas others have limited
11%
Detecting system compromise
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Nah Ting Feng, 123RF.com
called runtime integrity that promises not only the ability to detect when a system is attacked, but also to provide strong evidence that systems – even vulnerable systems in the face of dreaded zero
11%
Automated builds using CentOS 7 and Kickstart
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © Icetray, fotolia.com
: nmtui This will bring up the NetworkManager TUI screen as shown in Figure 3. Figure 3: Editing a connection from the NetworkManager TUI dialog
11%
Keeping container updates under control
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by nikko osaka on Unsplash
: How do you make best use of the capabilities offered by Rancher and its ilk to arrive at a secure platform with reliable tools that the common PaaS stacks bring to the table? I can already reveal
11%
Distributed Linear Algebra with Mahout
11.05.2022
Home »  HPC  »  Articles  » 
, rather than bringing in costly consultants to port business-critical algorithms and methods from an old system to a new. The Mahout project lived through the migration from Hadoop to Spark
11%
News for Admins
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
(https://www.businesswire.com/news/home/20230131005412/en/Red-Hat-and-Oracle-Expand-Collaboration-to-Bring-Red-Hat-Enterprise-Linux-to-Oracle-Cloud-Infrastructure) a new collaboration making Red Hat

« Previous 1 ... 67 68 69 70 71 72 73 74 75 76 77 78 79 80 ... 154 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice