Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (995)
  • Article (277)
  • News (260)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 91 92 93 94 95 96 97 98 99 100 101 102 103 104 ... 154 Next »

11%
SHA-3 – The new hash standard
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Warakorn Harnprasop, 133RF.com
. The proposals were discussed at several conferences and investigated for potential vulnerabilities. Besides the obvious reasons, calls to pay more attention to the subject in general had become more insistent
11%
Linking Kubernetes clusters
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Lead Image © choreograph, 123RF.com
, which describes which of the contexts is the default if you do not specify one when calling kubectl. You can easily edit the file with a text editor or use kubectl to do so. The names used in the file
11%
Hardening SSH authentication to the max
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © shutter999, 123RF.com
modules (HSMs) on Android devices, or Trusted Platform Modules on a laptop. The term "discoverable credential" is so called, because the client can determine a list of possible keys in the authenticator
11%
Monitoring Memory Errors
17.09.2013
Home »  Articles  » 
 
what are called single-bit errors, and although it can detect double-bit errors, it cannot correct them. A simple flip of one bit in a byte can make a drastic difference in the value of the byte
11%
Generate VM Images with virt-builder
15.04.2014
Home »  Articles  » 
 
distribution, you can now create a new Fedora image with the call: ./run builder/virt-builder fedora-19 --output fedora19.img--hostname fedora19 This command tells the tool to generate a random root password
11%
Environment Modules
23.02.2012
Home »  HPC  »  Articles  » 
/local/Modules connecting the current version of Environment Modules to a directory called default : % cd /usr/local/Modules % sudo ln -s 3.2.6 default The reason they recommend using the symbolic link is that, if you
11%
Increasing Throughput with Link Aggregation
26.10.2012
Home »  Articles  » 
 
data from a conversation? The standard assigns that task to a so-called frame distributor. There are no hard and fast rules for how the frame distributor distributes the data. The only requirement
11%
Monitoring NFS Storage with nfsiostat
12.03.2013
Home »  HPC  »  Articles  » 
B_nor/s, rMB_nor) The number of blocks (kilobytes, megabytes) read by applications using the NFS mounted filesystem with the read(2) system call. A block has 512 bytes. In the example, I chose to use
11%
Book Review: Land of Lisp
14.09.2011
Home »  Articles  » 
 
will call a thing of beauty. On the other hand, Lisp can also thwart seasoned professionals with a half-dozen languages under their belt -- and indeed, it does so in most cases, because it requires
11%
Power Talk
01.10.2011
Home »  Articles  » 
 
want to share with us? A: There is another feature called AMD Turbo CORE that allows us to boost frequency on processors when there is additional power headroom available. For HPC workloads

« Previous 1 ... 91 92 93 94 95 96 97 98 99 100 101 102 103 104 ... 154 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice