Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (370)
  • Article (117)
  • News (5)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 13 14 15 16 ... 50 Next »

12%
Bringing old hardware back into the game
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Lucy Baldwin, 123RF.com
and doubles the cache size (from 3 to 6MB), in exchange for a small drop in baseline clock speed – 2.3 to 2.2GHz (peak drops from 3.2 to 3.1GHz). Major Surgery Legend has it that no one has ever opened
12%
Podman for Non-Root Docker
05.08.2024
Home »  HPC  »  Articles  » 
 catatonit conmon containernetworking-plugins crun golang-github-containers-common   golang-github-containers-image netavark passt podman 0 upgraded, 11 newly installed, 0 to remove and 0 not upgraded. Need to get 32.3 MB of archives. After this operation, 131 MB
12%
Understanding Layer 2 switch port security
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Taffi, Fotolia.com
:1071867223(0) win 512 98:15:eb:38:f3:c1 c8:d7:c1:61:be:a3 0.0.0.0.30693 > 0.0.0.0.57646: S 1759104040:1759104040(0) win 512 dc:6d:43:15:be:52 99:19:41:22:4e:36 0.0.0.0.29211 > 0.0.0.0.63665: S 481173385
12%
Understanding the Status of Your Filesystem
18.06.2014
Home »  HPC  »  Articles  » 
]:  13502  (  3.48%)  ( 87.59% cumulative)    [     64-    128 KB]:  12083  (  3.11%)  ( 90.70% cumulative)    [    128-    256 KB]:   8623  (  2.22%)  ( 92.93% cumulative)    [    256-    512 KB]:  13437  (  3
12%
Configuring IPv6 in Windows with NetShell
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © James Steidl, 123RF.com
:db8:1234::/48, you can downgrade its authority using the following command: netsh interface ipv6 add prefixpolicy \ 2001:db8:1234::/48 3 6 In the preceding command, the number 3 states the priority ... Windows provides a simple dialog box for configuring IPv6, but the available settings only scratch the surface. IPv6 comes with many features that are primarily managed using the command-line tool ... Configuring IPv6 on Windows ... Configuring IPv6 in Windows with NetShell ... IPv6 on Board
11%
mpi4py – high-performance distributed Python
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © liu liming, 123RF.com
processes is shown in Listing 6. Notice that processes 3 and 4 didn't contribute or do anything. Listing 5 Point-to-Point 01 import numpy 02 from mpi4py import MPI 03 04 05 comm = MPI
11%
Kubernetes k3s lightweight distro
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image Photo by Josh Rakower on Unsplash
, according to the README file, requires "half the memory, all in a binary less than 40MB" to run. By design, it is authored with a healthy degree of foresight by the people at Rancher [3]. The GitHub page [4 ... The k3s lightweight and secure Kubernetes distribution can handle both unattended workloads in remote locations with minimal resources and clusters of IoT appliances. ... Kubernetes k3s lightweight distro
11%
Developing RESTful APIs
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © bowie15, 123RF.com
the entry with ID 6. In contrast to the name, the ID is unique. With the options method (Listing 3, lines 51-55), the server tells the user, on receiving an appropriate request, which HTTP verbs it supports
11%
First steps in IT automation by Rex
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Konstantin Chagin , 123RF.com
on the Rex host and then copy the public key over to the client (Listing 3). After that, a test login on the client without password should work. Listing 3 Key-Based Authentication 01 root
11%
Measuring the performance of code
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Lucy Baldwin, 123RF.com
in the standard Python built-ins [2] and in the NumPy library [3]. Figure 1: IPython session comparing two implementations of a round routine. Unless you

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 13 14 15 16 ... 50 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice