Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %200mb 12 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (852)
  • Article (204)
  • News (99)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 103 104 105 106 107 108 109 110 111 112 113 114 115 116 Next »

9%
Fast and scalable ownCloud Infinite Scale
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Markus Spiske on Unsplash
the flow of data in detail [12]. Before working with oCIS for the first time, you should have a look at that document for a better understanding of data flow. Initially, a file coming from a client will hit
9%
Darshan I/O analysis for Deep Learning frameworks
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Michaela Murphy on Unsplash
08 integer :: counter 09 integer :: counter_limit 10 integer :: ierr 11 12 type(rec) :: my_record 13 14 counter_limit = 2000 15 16 ierr = -1 17 open(unit=8,file
9%
Software-defined storage with LizardFS
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © larisa13, 123RF.com
that LizardFS 3.12.0 would include uRaft [8]. It is unclear whether he was referring to the disclosure of the source code or publication in binary form. It is unfortunate that Skytechnology, the company behind
9%
Setting up a PXE boot server
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
referred to as "router advertisement": enable-ra dhcp-range=tag:eno1,::1, constructor:eno1, ra-names, 12h If needed, you can specify additional DHCP options (according to RFC2132) that you want to pass
9%
Tools for managing AWS cloud services
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by elnaz asadi on Unsplash
). By default, a session expires automatically after 12 hours. To continue, just press the Click login to continue button and log in again. You can also set your own time limits for sessions according to your
9%
A ptrace-based tracing mechanism for syscalls
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Nadjib BR on Unsplash
_init_remote(&unw_cursor, g_unw_as, unw_ctx)); 05 06 /* - Search - */ 07 bool found_stack_entry = false; 08 do { 09 unw_word_t ip = 0; 10 unw_get_reg(&unw_cursor, UNW_REG_IP, &ip); 11 12 Dwfl_Module* module = dwfl
9%
Log analysis in high-performance computing
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Kier… in Sight on Unsplash
) that addresses cybersecurity with neural network models. The SDK, called Morpheus [12], is "… an open application framework that enables cybersecurity developers to create optimized AI pipelines for filtering
9%
Advanced MySQL security tips (a complete guide)
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © alphaspirit, 123RF.com
generated by the user: mysql> create user 'user'@'localhost' identified by 'password' - > with max_queries_per_hour 15 - > max_updates_per_hour 12 - > max_connections_per_hour 4 - > max
9%
Configuration management with CFEngine 3
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © iofoto, Fotolia.com
://cfengine.com has a Quickstart Guide with mini-documentation, whereas http://docs.cfengine.com has the official documentation. An archive [12] also houses a hodgepodge of old manuals, some of which are easier to read
9%
Secure access to Kubernetes
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Zachery Blanton, 123RF.com
Account 11 name: testserviceaccount 12 roleRef: 13 kind: Role 14 name: pod-reader 15 apiGroup: rbac.authorization.k8s.io Role Behavior If you want to manage what a user can access, you need

« Previous 1 ... 103 104 105 106 107 108 109 110 111 112 113 114 115 116 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice