Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (946)
  • Article (262)
  • News (43)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 68 69 70 71 72 73 74 75 76 77 78 79 80 81 ... 126 Next »

19%
Exploring the Relax and Recoverbackup and rescue system
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Rgbspace, Fotolia.com
=TSM HP Data Protector BACKUP=DP Symantec NetBackup BACKUP=NBU Duplicity/Duply BACKUP=DUPLICITY (still experimental) CommVault Galaxy 5, 6 and 7 BACKUP
19%
MySQL is gearing up with its own high-availability Group Replication solution
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © lassedesignen, 123RF.com
One important reason for the success of MySQL [1] is asynchronous replication, introduced in the 2001 release 3.23, which allows admins to set up replica instances (slaves) that receive all data
19%
Fixing Ceph performance problems
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Kritiya Sumpun, 123RF.com
storage by splitting up these files and putting them back together again later. When the user uploads a file to RADOS, the client breaks it down into several 4MB objects before uploading, which RADOS
19%
Lean Linux distribution for Kubernetes
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © joingate, 123RF.com
need an option to log in to remote systems (see the "Immutable IT" box). Talos Linux occupies less than 90MB when installed, compared with Ubuntu, which hogs almost 2GB in a minimal installation (Figure ... takes the game to the extreme and offers a system for Kubernetes that weighs in at less than 90MB.
19%
Convert Linux shell commands into PowerShell cmdlets
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Larisa Birta on Unsplash
\\Documents\PowerShell\Modules\Microsoft.PowerShell.Crescendo\0.6.1\Samples folder with some sample files intended for Unix-style commands. Executing Commands The most common use of Crescendo-generated wrappers is to wrap command-line commands in verb
19%
DevSecOps with DefectDojo
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © Aleksey Mnogosmyslov, 123RF.com
credentials. the initializer can take up to 3 minutes to run 08 # use docker-compose logs -f initializer to track progress 09 docker-compose logs initializer ? grep "Admin password:" First, run
19%
Moore's Law Continues its Unwavering March
09.10.2013
Home »  HPC  »  Articles  » 
boasted an impressive 291 million transistors, 10,034 times the original [2]. The first CPU to break the 3GHz barrier was an Intel Pentium 4 variant released in 2002, but disregarding unreliable
19%
Porting CUDA to HIP
15.11.2019
Home »  HPC  »  Articles  » 
_foo.cpp A recommended workflow for using hipify-perl is as follows: 1. Run the hipify-perl script on the CUDA source code. 2. Check the resulting HIP code into your preferred version control system. 3. Build the code
19%
A ptrace-based tracing mechanism for syscalls
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Nadjib BR on Unsplash
_PRELOAD, as well. libiotrace: Just Another Profiling Tool? A typical CPU computes data faster than data can be fetched from or stored to main memory (the so-called memory wall) [3]. Storage only exacerbates
19%
The end of SHA-1
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © destinacigdem, 123RF.com
as "deprecated." Stubborn Despite NIST's recommendation to discontinue SHA-1 and despite the availability of a secure successor in the SHA-2 and, later, the SHA-3 family, SHA-1 continued to be used virtually

« Previous 1 ... 68 69 70 71 72 73 74 75 76 77 78 79 80 81 ... 126 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice