Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: "0mbén Llorente%2222 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (937)
  • Article (296)
  • News (166)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 96 97 98 99 100 101 102 103 104 105 106 107 108 109 ... 141 Next »

29%
Performance Health Check
13.06.2022
Home »  HPC  »  Articles  » 
Many HPC systems check the state of a node b efore  running a n  application, but not very many check that the performance of the node is acceptable before running the job. ... .69 17.26 67.7 IS (4 cores) 0.6 2.16 8.2 LU (6 cores) 5.13 41.8   MG (4 cores) 1.2 3.8 39.1 SP (4 cores ... Many HPC systems check the state of a node b efore  running a n  application, but not very many check that the performance of the node is acceptable before running the job.
29%
Where Does Job Output Go?
11.09.2023
Home »  HPC  »  Articles  » 
– the rank 0 process – perform I/O. Consequently, a shared filesystem wasn’t needed, and I/O could happen locally on one node. For many applications, local node storage provided enough I/O performance
29%
11 Tricks for Windows servers
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Kati Molin, Fotolia
ControlSet | Control | Terminal Server key. With this approach, you can activate Remote Desktop by importing registry entries. The most important entry is fDenyTSConnection . A value of 0 activates Remote Desktop
29%
Building sustainably safe containers
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © it studiom1, 123RF.com
/lib/gcc/x86_64-pc-linux-gnu/9.3.0/lib* /lib64/ ---> 6f7d7264921c Step 4/6 : ADD gentoo-java.tar.gz / ---> afb2d5612109 Step 5/6 : ENV JAVA_HOME /opt/icedtea-bin-3.16.0 [...] 441dec54d0dd: Pushed 22bac475857f
29%
Secure containers with a hypervisor DMZ
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © lightwise, 123RF.com
=kata-fc -itd --name=kata-fc busybox sh d78bde26f1d2c5dfc147cbb0489a54cf2e85094735f0f04cdf3ecba4826de8c9 $ pstree|grep -e container -e kata |-containerd-+-containerd-shim-+-firecracker---2*[{firecracker
29%
Automate complex IT infrastructures with StackStorm
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Fré Sonneveld on Unsplash
details and list executions with: st2 execution st2 execution list To limit the output to the last 10 executions, use st2 execution list -n 10 Rules are an essential tool of the StackStorm concept
29%
SSL/TLS best practices for websites
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Yevgeniya Ponomareva, Fotolia.com
as reliably as the rest of the PKI world. 4. Protocols A public website must support the TLS 1.0, TLS 1.1, and TLS 1.2 protocols. SSL 2 is obsolete and insecure. SSL 3 is also deprecated and, although
29%
Measuring the performance health of system nodes
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Peter Hermes Furian, 123RF.com
.05 FT (4 cores) 1.69 17.26 67.7 IS (4 cores) 0.6 2.16 8.2 LU (6 cores) 5.13 41.8 MG (4 cores) 1.2 3.8 39
29%
Management improvements, memory scaling, and EOL for FileStore
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Yannic Läderach on Unsplash
mgr/cephadm/autotune_memory_target_ratio 0.2 when upgrading to Ceph 17.2. Compression As is the wont with Ceph, the individual Ceph components come with a cornucopia of small but subtle changes ... Ceph 17.2
29%
Software-defined networking for the future
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Leio McLaren on Unsplash
of network Layers 0 to 2+ can be controlled, which also includes optical and microwave technologies. XOS defines the highest level of service control, which is the top layer over various back-end service

« Previous 1 ... 96 97 98 99 100 101 102 103 104 105 106 107 108 109 ... 141 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice