Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1075)
  • Article (333)
  • News (247)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 94 95 96 97 98 99 100 101 102 103 104 105 106 107 ... 166 Next »

11%
The History of Cluster HPC
15.02.2012
Home »  HPC  »  Articles  » 
by multicore systems. Results for a 12-core (dual socket with six-core processors) server can be found here. These tests, which used a variety of numerical benchmarks, resulted in a range from 41% to 98
11%
Unprecedented built-in support for diverse languages
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Yang MingQi, 123RF.com
11). Then, add the Spanish equivalents for the title and body field (Figure 12.) Figure 11: Content editing Translate tab
11%
Centralized monitoring and intrusion detection
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by Stoochi Lam on Unsplash
and anomalies and offers alerting functions. The Security Onion web interface uses standardized tools to display content, primarily relying on Kibana [12] and Grafana [13]. Kibana displays the incoming data
11%
Run Kubernetes in a container with Kind
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © Kirsty Pargeter, Fotolia.com
-Lo ./kind https://kind.sigs.k8s.io/dl/v0.10.0/kind-linux-amd64 $ chmod +x ./kind $ mv ./kind /usr/local/bin/kind $ kind --version kind version 0.10.0 Get an incredibly quick start
11%
Importing SSH keys on AWS
05.08.2011
Home »  CloudAge  »  Blogs  »  Dan Frost's Blog  » 
 
see the newly uploaded keypair: ec2-describe-keypairs KEYPAIR dan-key fc:39:b2:60:90:4c:0f:66:fc:b8:a6:54:af:19:0c:ef KEYPAIR my-key a6:54:af:19:0c:ef:fc:39:0f:66:fc:b8:b2:60:90:4c KEYPAIR your
11%
Understanding Cybersecurity Maturity Model Certification
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Braden Collum on Unsplash
. CMMC in Depth CMMC is currently on its second iteration, CMMC 2.0. The prior iteration of CMMC was CMMC 1.0, which built a framework of four elements: security domains, capabilities, practices
11%
Securing the container environment
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © zeferli, 123RF.com
--server 3.71.72.105 -i kubeletctl pods --cidr 3.71.72.0/24 -i Figure 1: Scanning for nodes to see if they are vulnerable with an exposed kubelet
11%
IPRoute2: arp, route, and ifconfig in a Single Tool
06.08.2013
Home »  Articles  » 
 
tool in IPRoute2 is ip. In many cases, additional options can be set for the show commands. For example, if you only want to output the IP configuration for eth0 , the short command is ip address
11%
Network management with the IPRoute2 toolbox
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © donatas1205, 123RF.com
: The most important tool in IPRoute2 is ip. In many cases, additional options can be set for the show commands. For example, if you only want to output the IP configuration for eth0, the short command
11%
GlusterFS Storage Pools
17.11.2016
Home »  HPC  »  Articles  » 
. Figure 1: Client systems access the desired GlusterFS volume via a single namespace. (Red Hat CC BY-SA 3.0 [1]) When you look under the hood of GlusterFS, it is striking that the filesystem

« Previous 1 ... 94 95 96 97 98 99 100 101 102 103 104 105 106 107 ... 166 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice