Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcomm 12 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (881)
  • Article (211)
  • News (92)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 89 90 91 92 93 94 95 96 97 98 99 100 101 102 ... 119 Next »

9%
Building more efficient database applications with a graph database
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Jakub Krechowicz, 123RF.com
comparison in Table 1. Table 1 Five Graph Databases Name Neo4j 1.6 Sones Graph DB 2.0 InfoGrid 2.9.5 HyperGraphDB 1.1 VertexDB Homepage http
9%
File access optimization discovery and visualization
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by Barnabas Davoti on Unsplash
access and its potential optimizations. The time series panel at the top in Figure 12 shows the detailed course of the file access cursor, along with the calculated offsets. The colors of the points
9%
Network analysis with Wireshark
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Reinhard Eisele
runs with root privileges. The exceptions are Mac OS X and Solaris, where the user only needs access privileges for the network interface card device file. By default, Tcpdump reads all the data
9%
Backup tools to save you time and money
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Melissa King, 123RF.com
machines. Moving an external hard disk between two machines might be easiest, but with 20 machines, you should definitely consider a centralized system. Here, too, you must consider the speed at which you
9%
Denial of Service in the Cloud
12.11.2013
Home »  Articles  » 
orchestrated DDoS attacks. In the DDoS attacks on US financial institutions last year, the offenders achieved 20 times the effect of ordinary desktop botnets with a handful of servers. This trend exacerbated
9%
RADOS and Ceph: Part 2
22.10.2012
Home »  HPC  »  Articles  » 
must ensure that its contents are available redundantly within the whole cluster. Not the least of developers’ problems is dealing with “rack awareness.” If you have a 20-node cluster with RADOS in your
9%
Analyzing Kernel Crash Dumps
25.11.2012
Home »  Articles  » 
 
by the kdump startup script, but only if a protected memory area is also present. To let the original kernel know this, you need to specify the boot loader option crashkernel=XM[ @YM] , where X is the size
9%
How Old is That Data?
20.04.2017
Home »  HPC  »  Articles  » 
Files are 10x bigger than in previous studies Files are rarely reopened: >66 percent are reopened just once and 95 percent are opened fewer than five times <1 percent of clients account for 50
9%
Modern Fortran – Part 3
25.01.2017
Home »  HPC  »  Articles  » 
to maintain program correctness. Listing 1 is an example of the ways you can define a coarray. Listing 1: Defining Coarrays integer :: x[*]   ! scalar coarray   real
9%
Monitor your network infrastructure with SNMP
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © lightwise, 123RF.com
/bin/rpi-update \ https://raw.githubusercontent.com/Hexxeh/rpi-update/master/rpi-update && \ chmod +x /usr/bin/rpi-update 08 $ sudo rpi-update 09 $ sudo reboot I enabled SNMP agents on all the access points used

« Previous 1 ... 89 90 91 92 93 94 95 96 97 98 99 100 101 102 ... 119 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice