Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last month
Sort order
  • Date
  • Score
Content type
  • Article (Print) (3)
  • Article (1)
Keywords
100%
Changing Horses
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © nexusplexus, 123RF.com
told you so," was not in the realm of possibilities when some higher-ups were looking for scapegoats. It wasn't the time to point fingers of guilt at the guilty. It was time to just stay silent and move
97%
Tuning loops – from loop unrolling to Duff's device
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
of all evil" sums up this point of view neatly [3]. The reasons for such a statement are particularly apparent in the many mangling strategies one can choose to apply to loops (Table 1). These strategies
97%
Compressed Archives for User Projects
11.08.2025
Home »  Articles  » 
control this project. The cool thing is that I can do everything as a user and don’t need any intervention by root, which is the point of this article. I’ll begin by reviewing both FUSE and
96%
Better monitoring for websites and certificates
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © amasterpics123, 123RF.com
in standalone mode with TLS, certificate, and string options. Up to this point, the check provides information about whether the page is accessible, which protocol is used, whether a redirect has taken

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice