Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1020)
  • News (227)
  • Article (223)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 93 94 95 96 97 98 99 100 101 102 103 104 105 106 ... 148 Next »

13%
Five HPC Pitfalls (Part 1)
13.03.2012
Home »  HPC  »  Articles  » 
of a Network Area Storage (NAS) appliance. Each appliance will adhere to the NFS protocol, but poor performance can greatly limit the true potential of a cluster. A similar situation exists for network
13%
Stopping Side Channel Attacks
16.10.2012
Home »  Articles  » 
 
, the network components, or any active applications. The study might also include file paths to confidential data or configuration files. Of course, the security of encryption and cryptographic signatures
13%
Interview: Hardware or Cloudware?
10.04.2012
Home »  HPC  »  Articles  » 
to seamlessly create the illusion that there was just one computer. And that went through multiple iterations – in the ’70s with distributed computing, in the ’80s with network computing, in the ’90s with network
13%
AMD’s Greg Stoner on ROCm
31.10.2017
Home »  HPC  »  Articles  » 
-learning library, which supports GPU acceleration for deep convolution networks. We’re in the process of porting several machine-learning libraries and tools. Many of these tools were written with CUDA, and we can
13%
Trivy security scanner
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Lead Image © MPower, photocase.com
.zones 27 network = data.terraform_remote_state.vpc.outputs.network_name 28 subnetwork = data.terraform_remote_state.vpc.outputs.subnets_names[0] 29 ip
13%
A Password Protection Service
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © bluebay, 123RF.com
intrusion prevention monitoring on any service port that uses username/password combinations for authentication. And while Fail2ban runs as a daemon, it does not expose any new listening network ports
13%
Radeon Open Compute Ecosystem
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
machine-learning library, which supports GPU acceleration for deep convolution networks. We're in the process of porting several machine-learning libraries and tools. Many of these tools were written
13%
Accelerate web applications with Varnish Cache
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Aleksandr Frolov, 123RF.com
Varnish Cache, you can speed up the delivery of web pages with performance that is usually limited only by the speed of the network itself. Classic Apart from optimizing the cache functions
13%
Advanced Windows security using EMET
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Andrii IURLOV, 123RF.com
to distribute EMET using group policies. You can centralize configuration using group policies and administrative template files if you have successfully distributed EMET in your network. Copy the files EMET
13%
This Linux hardware company puts the emphasis on freedom and privacy
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Image courtesy Swapnil Bhartiya
with a physical kill switch that you can use to physically disconnect components like the webcam, microphones, and networking chips. No need to put a tape on your webcam. You can flip a hardware switch

« Previous 1 ... 93 94 95 96 97 98 99 100 101 102 103 104 105 106 ... 148 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice