Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1270)
  • News (231)
  • Article (228)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 123 124 125 126 127 128 129 130 131 132 133 134 135 136 ... 174 Next »

12%
Better compression of web pages
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
at the network bottleneck. Gzip compression of dynamic content takes place at the server on the fly. The web server reads the file from the filesystem, pipes it through Gzip, and then delivers the result
12%
An interview with SUSE CEO Nils Brauckmann
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Photos Courtesy of Swapnil Bhartiya
Invention Network [OIN]. Together with Red Hat, we strengthen that network through SUSE and Novell patents that are part of that portfolio. This pool of patents is used to defend open source against possible
12%
LibreOffice in the workplace
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © mipan, 123RF.com
and productive basis, you have to look intensively at the program and its community – and ideally even at the network – not only to understand the structures and leverage the support of the community, but also
12%
Selecting compilers for a supercomputer
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image Photo by Michal Kmet on Unsplash
with threads in a shared main memory) [6] and Message Passing Interface (MPI, a library-based system for parallelization to distributed main memory, typically via a high-speed network connecting the nodes) [7
12%
Isolate workloads from Docker and Kubernetes with Kata Containers
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Stephen Pedersen on Unsplash
is handled by a relatively new mechanism in the Linux kernel. Namespaces keep a record within the kernel of which process is allowed to access which resources (e.g., processes, network interfaces, or hard disk
12%
Mesos compute cluster for data centers
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Artisticco LLC, 123RF.com
available at runtime. In the as-delivered state, the number of processors, the RAM, disk space, and free network ports are predefined. Without any customization, the slave simply tells the master what
12%
The OpenResty distribution for Nginx
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Kirill Kurashov, 123RF.com
2 /lib/systemd/system/nginx.service (systemd) 01 [Unit] 02 Description=OpenResty Stack for Nginx 03 After=syslog.target network.target remote-fs.target nss-lookup.target 04 05 [Service] 06
12%
The Lua scripting language
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Nataliya Velykanova, 123RF.com
." However, Lua can also be found in a variety of network and system programs, such as the Wireshark network analyzer, the Nmap scanner [2], the MySQL Proxy program, the Rspamd anti-spam solution, the Free
12%
First steps in IT automation by Rex
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Konstantin Chagin , 123RF.com
such as the uptime. You can use the same technique to obtain other client values, such as the amount of free memory (free or vmstat), the fill factor of the hard disks (df), the network utilization (netstat
12%
Artificial intelligence improves monitoring
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Photo by Ivan F on Unsplash
as the implementation stage which algorithm to use or how to filter what set of information. In deep learning, on the other hand, a neural network determines which information it passes on and how this information

« Previous 1 ... 123 124 125 126 127 128 129 130 131 132 133 134 135 136 ... 174 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice