Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: "0mbén Llorente%2222 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1160)
  • Article (301)
  • News (171)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 69 70 71 72 73 74 75 76 77 78 79 80 81 82 ... 164 Next »

28%
High-performance Python – compiled code and C interface
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Konrad Bak, 123RF.com
total x = numpy.arange(10_000_000); %time sum(x) CPU times: user 1.63 s, sys: 0 ns, total: 1.63 s Wall time: 1.63 s Next, add Numba into the code (Listing 2) so the @jit decorator can be used. (Don
28%
Static code analysis finds avoidable errors
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Andrey KOTKO, 123RF.com
> 0 ) && (argv != NULL) ) 13 { 14 strncpy(buffer, argv[1], (size_t) (BUFSIZE-1)); 15 printf("%s\n",buffer); 16 } 17 return 0; 18 } // end main() The clues
28%
Network security in the Google Cloud Platform
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Jannet Serhan on Unsplash
is required to create a rule (Figure 2): The firewall rule Name should be as descriptive as possible, and policies should be created by use case and not be too specific about individual ports or IP
28%
Link Encryption with MACsec
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © Oleksandr Omelchenko, 123RF.com
with an Ethertype of 0x88e5 on the provider's network. Because MACsec works on Layer 2, it must be individually enabled for each interface. Encryption Method MACsec uses AES-GCM as the encryption algorithm ... MACsec encrypts defined links with high performance and secures Layer 2 protocols between client and switch or between two switches.
28%
Samba 4 appliances by SerNet and Univention
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Ricky Grant, 123RF.com
implementation in the current v0.6 of the Samba SerNet appliance [2] is equivalent to the stable version of Samba 4.0 [3]. Samba 4 Structure A Samba domain comprises at least one Samba 4-based domain controller
28%
Better Active Directory with Windows Server 2012
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Sattapapan Tratong, 123RF.com
now both include the new PowerShell version 3.0, which is much easier to use than its predecessor in Windows Server 2008 R2. Using Dynamic Access Control, administrators can more easily control
28%
The RADOS object store and Ceph filesystem
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Brigida Soriano, Fotolia.com
to install RADOS and Ceph. Ceph, which is a plain vanilla filesystem driver on Linux systems (e.g., ext3 or ext4), made its way into the Linux kernel in Linux 2.6.34 and is thus available for any distribution
28%
Autoconfiguring IPv6 Clients
30.03.2012
Home »  Articles  » 
 
in the network properties, thus forcing Internet Explorer to use the proxy. If Windows 7 fails to find a DNS server, it uses three standard addresses as its name servers: fec0::1 , fec0::2 and fec0
28%
ZFS on Linux helps if the ZFS FUSE service refuses to work
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Luis Louro, 123RF.com
at least outputs some information. What you need is access to the filesystem, which could reside in 06:zfs0; however, to determine the name of the pool, you need a zpool import (Listing 2). The name
28%
A new approach to more attractive histograms in Prometheus
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Markus Winkler on Unsplash
. # TYPE http_request_duration_seconds histogram http_request_duration_seconds_bucket{le="1"} 0 http_request_duration_seconds_bucket{le="2.5"} 1 http_request_duration_seconds_bucket{le="5"} 2 http

« Previous 1 ... 69 70 71 72 73 74 75 76 77 78 79 80 81 82 ... 164 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice