Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (995)
  • Article (277)
  • News (260)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 110 111 112 113 114 115 116 117 118 119 120 121 122 123 ... 154 Next »

11%
Using rsync for Backups
07.01.2014
Home »  Articles  » 
 
of space (20 + 25 + 30), with no doubt lots of duplicated data wasting space and money. The backup world uses a few techniques that differentiate it from replication. The first is called a “full backup
11%
Lmod – Alternative Environment Modules
30.01.2013
Home »  HPC  »  Articles  » 
approaches called “Flat Naming Scheme” or “Hierarchical Naming Scheme.” In the Flat Naming Scheme, you create modules with names that have all of the details on the build tools in the name itself. For example
11%
Autoconfiguring IPv6 Clients
30.03.2012
Home »  Articles  » 
 
interface is used for this. In kernel versions prior to 2.6.24, the service itself tries to sniff and parse the advertisements. The daemon is called rdnssd and comes with the Ndisc6 package, which includes
11%
Interview: Hardware or Cloudware?
10.04.2012
Home »  HPC  »  Articles  » 
that different organizations can actually share what we call application definitions and then only have to configure the very site-specific stuff for a particular set of applications. AM: Compute Manager
11%
Managing Cluster Software Packages
12.02.2013
Home »  HPC  »  Articles  » 
the currently loaded modules in an environment variable called LOADEDMODULES . For example, if I load two modules (ftw and mpich2 ) and then look at my environment, I will find: LOADEDMODULES=fftw/3.3.2/gnu4
11%
SHA-3 – The New Hash Standard
15.04.2013
Home »  Articles  » 
 
at several conferences and investigated for potential vulnerabilities. Besides the obvious reasons, calls to pay more attention to the subject in general had become more insistent. Cryptographic hash functions
11%
Graphite: Collect and Visualize Numeric Data
30.07.2014
Home »  HPC  »  Articles  » 
Graphite is hierarchically structured, real-time graphing system (Figure 1). A client collects data from the source, and a Graphite daemon on TCP port 2003 called Carbon receives the data and stores
11%
Co-Design Approach to Supercomputing
12.01.2012
Home »  HPC  »  Articles  » 
Flash to prototype alternative node designs and inform vendors about design alternatives for the DOE exascale program. This new project is called CoDEx (CoDesign for Exascale). It is repurposing
11%
Pen Test Tips
30.04.2012
Home »  Articles  » 
 
can run a packet sniffer on the target system after you allow your team member to obtain a meterpreter shell. This meterpreter script is called packetrecorder and allows some more granularities when
11%
Security data analytics and visualization with R
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Rancz Andrei, 123RF.com
In this era of massive computing environments, cloud services, and global infrastructure, it is reasonable to call data "big," although this is the first and last time I'll do so in this article

« Previous 1 ... 110 111 112 113 114 115 116 117 118 119 120 121 122 123 ... 154 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice