Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (301)
  • Article (57)
  • Blog post (2)
  • News (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 5 6 7 8 9 10 11 12 13 14 15 16 17 18 ... 37 Next »

41%
Test your containers with the Docker Desktop one-node cluster
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Alex Kondratiev on Unsplash
kind: Service 03 metadata: 04 name: nginx 05 spec: 06 ports: 07 - port: 8080 08 targetPort: 80 09 selector: 10 app: nginx Listing 7 my-k8s-app/webapp-service.yaml 01
40%
Application virtualization with Docker
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Oleksiy Mark, 123RF.com
=docker.socket [Service] Type=notify EnvironmentFile=-/etc/sysconfig/docker ExecStart=/usr/bin/docker -d -H fd:// $OPTIONS LimitNOFILE=1048576 LimitNPROC=1048576 Environment="HTTP_PROXY=http://proxy.example.com:80/" "NO
40%
Make Your IT Automation Systems Play Together Like a Symphony
15.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
© jeancliclac, Fotolia.com
-server-ctl user-create jstanger James Stanger jstanger@company.com Cr8*p@sswrd*here -f /tmp/jstanger.key Now that you’ve created a certificate and a user, make sure that the PEM files are in the right place
40%
PowerShell Part 1: Retrieving System Information
18.03.2012
Home »  Articles  » 
 
:\Users\khess> $Host Name : ConsoleHost Version : 2.0 InstanceId : ccbc6963-c33e-4848-a8e5-aa1ccaf7d65c UI : System
40%
New Systemd Vulnerability Affects Most Mainstream Linux Distributions
15.01.2019
Home »  News  » 
 
or Canonical to fix these vulnerabilities. Source: https://www.qualys.com/2019/01/09/system-down/system-down.txt
40%
Kubernetes StatefulSet
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Ashley Light on Unsplash
https://mirror.openshift.com/pub/open-shift-v4/$(uname -m)/clients/ocp/stable/openshift-client-linux.tar.gz tar -xf openshift-client-linux.tar.gz -C /usr/local/bin oc kubectl To check whether the back
40%
Error-correcting code memory keeps single-bit errors at bay
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Igor Stevanovic, 123RF.com
is http://buttersideup.com/edacwiki/ and the edac.txt in the kernel doc. 06 07 # EDAC memory reporting 08 if [ -d /sys/devices/system/edac/mc ]; then 09 # Iterate all memory controllers 10 for mc
40%
hwloc: Which Processor Is Running Your Service?
07.11.2011
Home »  HPC  »  Articles  » 
GB) 03     Socket P#0 04       Core L#0 + PU L#0 (P#0) 05       Core L#1 + PU L#1 (P#2) 06       Core L#2 + PU L#2 (P#4) 07       Core L#3 + PU L#3 (P#6) 08   NUMANode P#1 (12GB) 09     Socket P#1 10
40%
Lmod – Alternative Environment Modules
30.01.2013
Home »  HPC  »  Articles  » 
difficult. (Note that lowercase “environment module” indicates a generic capability and capitalized “Environment Module” indicates a particular implementation of that capability). The particular capability I’m
40%
Correctly integrating containers
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Beboy, Fotolia.com
[...] 02 apiVersion: extensions/v1beta1 03 kind: Ingress 04 metadata: 05 name: test 06 spec: 07 rules: 08 - host: foo.bar.com 09 http: 10 paths: 11 - path: /foo 12 backend: 13

« Previous 1 ... 5 6 7 8 9 10 11 12 13 14 15 16 17 18 ... 37 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice