Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1266)
  • Article (320)
  • News (209)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 89 90 91 92 93 94 95 96 97 98 99 100 101 102 ... 180 Next »

9%
PowerShell Part 2: Manipulating Services, Processes, and Commands
17.04.2012
Home »  Articles  » 
 
and on remote systems. PowerShell is in a state of flux; it evolves with each iteration of Microsoft’s operating systems. Windows 7 and Windows Server 2008 use PowerShell 2.0, which this series covers. Windows 8
9%
StarCluster Toolkit: Virtualization Meets HPC
16.01.2013
Home »  HPC  »  Articles  » 
$ starcluster help StarCluster - (http://web.mit.edu/starcluster) (v. 0.93.3) Software Tools for Academics and Researchers (STAR) Please submit bug reports to starcluster@mit.edu !!! ERROR - config file
9%
Tuning Your Filesystem’s Cache
16.02.2012
Home »  Articles  » 
 
: Vmtouch Gzip Example 01 $ ./vmtouch /bin/gzip 02   Files: 1 03   Directories: 0 04   Resident Pages: 0/15  0/60K  0% 05   Elapsed: 8.1e-05 seconds 06 $ ./vmtouch -vt /bin/gzip 07 /bin/gzip 08
9%
Tuning your filesystem's cache
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
. Vmtouch comes to the rescue with its most powerful option: -dl, for "daemonize and lock." Listing 1 Vmtouch Gzip Example 01 $ ./vmtouch /bin/gzip 02 Files: 1 03 Directories: 0 04
9%
Check your VoIP networks with SIPVicious and sngrep
30.11.2025
Home »  Archive  »  2025  »  Issue 90 VoIP N...  » 
Photo by Quino Al on Unsplash
are missing, potential causes include invisible SIP traffic, incorrect selection of the network interface, or missing permissions. Your first step is to check whether SIP traffic exists sudo tcpdump -i eth0
9%
Veeam Agent for Linux backup software
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Aleksey Mnogosmyslov, 123RF.com
wget to retrieve and save them directly to the server [1]. The download is more than 300MB, because they currently have no option for selecting the package format and architecture. During installation
9%
Millions of Intel Processors Are Vulnerable to Attack
21.11.2017
Home »  News  » 
 
Firmware versions 11.0/11.5/11.6/11.7/11.10/11.20, SPS Firmware version 4.0, and TXE version 3.0 are impacted.” The affected products include sixth, seventh, and eighth generation Intel Core Processor
9%
Distributed Linear Algebra with Mahout
11.05.2022
Home »  HPC  »  Articles  » 
 Samsara online. Listing 1: Samsara Syntax Examples val G = B %*% B.t - C - C.t + (xi dot xi) * (s_q cross s_q) // Dense vectors: val denseVec1: Vector = (1.0, 1.1, 1.2) val denseVec2 = dvec(1, 0, 1, 1, 1, 2)   // Sparse
9%
New Products
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
 
management engine with power optimization software, all on one piece of silicon. The EnergyCore SoC also includes a full complement of server I/O features and a large 4MB ECC L2 cache. To learn more, visit
9%
Automating repetitive tasks
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Greg Rakozy on Unsplash
desktop license provides access to process mining on desktops and 50MB of process mining data storage, which can be expanded to up to 100GB per tenant. Power Automate Premium also provides AI tools

« Previous 1 ... 89 90 91 92 93 94 95 96 97 98 99 100 101 102 ... 180 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice