Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %25x20mm 12%2008 Llorente%2013 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (289)
  • Article (64)
  • News (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 ... 36 Next »

53%
Discover the power of RouterBOARDS
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Lead Image © andreysuslov, 123RF.com
Rubén Llorente ... a blacklist from the EasyList [12] or StevenBlack [13] host file and loading it to the DNS server or the proxy server for your clients to use. Personally, I use a separate device for this task for performance
38%
A Brief History of Supercomputers
21.01.2021
Home »  HPC  »  Articles  » 
This first article of a series looks at the forces that have driven desktop supercomputing, beginning with the history of PC and supercomputing processors through the 1990s into the early 2000s. ... 1992 i486DX2 2:1 clock multiplier, 40/20, 50/25, 66/33 speeds; L2 on MB Mar 1994 i486DX4 3:1 clock multiplier, 75/25, 100/33 speeds; 16KB L1 cache on-die, L2 ... This first article of a series looks at the forces that have driven desktop supercomputing, beginning with the history of PC and supercomputing processors through the 1990s into the early 2000s.
30%
Elastic Beanstalk
29.10.2013
Home »  Articles  » 
 
ScalingGroupName/awseb-e-hxaxpp3bsa-stack-AWSEBAutoScalingGroup-1NMEE2RF9GMBP:policyName/awseb-e-hxaxpp3bsa-stack-AWSEBAutoScalingScaleUpPolicy-1Q75QYV2QAY6X 2013-05-08 20:25:18 INFO Created CloudWatch alarm named: awseb-e-hxaxpp3
29%
Storage across the network with iSCSI and Synology DiskStation Manager
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © Vladimir Nenov, 123RF.com
Attaching an iSCSI Device $ uname -a Linux DANSBOX 6.8.0-35-generic #35-Ubuntu SMP PREEMPT_DYNAMIC Mon May 20 15:51:52 UTC 2024 x86_64 x86_64 x86_64 GNU/Linux $ lsblk NAME MAJ:MIN RM SIZE RO TYPE ... The iSCSI protocol lets you access block storage across a network connection. We show you how to connect a Debian 12 system with a Synology storage device over iSCSI.
28%
Using a Bash script to mirror external monitors
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © bowie15, 123RF.com
" ; shift 20 local display_list="$1" 21 while read display width_mm height_mm width height ; do 22 if [[ "$display" == "$find_display" ]] ; then 23 echo ${width}x${height} 24
27%
Small-board computers
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © Author, 123RF.com
: Tegra X1: 25.6GBps memory bandwidth HDMI 2.0 and HDCP 2.2 10W power Peak performance: 1,024GFLOPS with FP16; 512GFLOPS with FP32 ARM Cortex CPUs: Quad-core 64-bit ARM Cortex-A57 ... 25
27%
Look for Bottlenecks with Open|SpeedShop
21.12.2011
Home »  HPC  »  Articles  » 
 ./smg2000 -n 90 90 90" [openss]: pcsamp experiment using the pcsamp experiment default sampling rate: "100". [openss]: Using OPENSS_PREFIX installed in /home/jeg/chaos_4_x86_64_ib/opt/OSS-mrnet [openss
27%
Security data analytics and visualization with R
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Rancz Andrei, 123RF.com
(HostCt, ServerOwner, Date) %>% 099 arrange(desc(HostCt)) 100 head11 <- head(top11, 25) 101 102 data12 <- sheet12 103 patchdata12 <- data.frame(data12) 104 top12 <- patchdata12 %>% 105 select
26%
TLS 1.3 and the return of common sense
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image Creative Commons CC0 TheDigitalArtist Pixabay
Minus20, and similar exploits. [TLS 1.2]: Deactivate ciphers with insecure padding, such as RSA-based ciphers with PKCS#1v1.5 to mitigate ROBOT-style attacks. [TLS 1.2]: Turn off cipher suites based ... After a decade in service, TLS 1.2 is showing many signs of aging. Its immediate successor, TLS 1.3, has earned the approval of the IETF. Some major changes are on the way.
26%
Desktop Blades (of Glory)
06.05.2024
Home »  HPC  »  Articles  » 
(different from Raspberry Pi), and 2.5 or 10 Gigabit Ethernet (GbE). The card is 60x69.6mm (about 2.4x2.84 inches), which makes it a little taller than a credit card and a bit over 1U (Figure 4

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 ... 36 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice