Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1017)
  • News (227)
  • Article (221)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 111 112 113 114 115 116 117 118 119 120 121 122 123 124 ... 147 Next »

13%
Linux with Windows 8
08.01.2013
Home »  Articles  » 
 
to update the Windows registry. Back up your system registry, just in case. Minor changes to the Windows registry have caused serious networking issues in Windows systems. Many is the time a minor change
13%
Eat. Pray. Script.
23.12.2011
Home »  Articles  » 
 
environment. So, you have the best of both worlds: Windows and Linux. You can use Windows commands mixed with Linux commands. For example, if you want to see a list of all systems on your network that begin
13%
Persistent Memory
14.01.2016
Home »  HPC  »  Articles  » 
. Additionally, you have to consider moving data from the network interface to PM via the filesystem. With PM, you have extremely fast storage, and the I/O bottleneck might just have moved to the network interface
13%
Getting Ready for the New Ceph Object Store
19.05.2016
Home »  HPC  »  Articles  » 
The situation seems paradoxical: Ceph started life more than 10 years ago as a network filesystem. Sage Weil, the inventor of the solution, was looking into distributed filesystems at the time in the scope of his
13%
NVDIMM Persistent Memory
22.09.2016
Home »  HPC  »  Articles  » 
consisting of capacitors and typically used as main memory in PCs and servers. HBA Host Bus Adapter: Hardware interface that connects a computer to a bus or a network system. The term is commonly
13%
Small Tools for Managing HPC
18.10.2017
Home »  HPC  »  Articles  » 
machine to the target machine with no encryption – including passwords. Therefore, a very simple network sniff could gather lots of passwords. Using rsh , rlogin , or telnet between systems across
13%
Desktop Blades (of Glory)
06.05.2024
Home »  HPC  »  Articles  » 
, the components you needed to build them, the networking you needed, the concepts for managing and monitoring them, how to program them, how to debug and identify bottlenecks, and so on; however, some were being
13%
Transport Encryption with DANE and DNSSEC
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © nerhuz, 123RF.com
Communication needs privacy. It forms the basis for confidential and binding exchange. A typical email does not offer any privacy as it passes through the network in cleartext. Anyone who reads
13%
A versatile proxy for microservice architectures
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Russell Shively, 123RF.com
reviewed in an earlier article [1], are currently enjoying great popularity, promising admins an automated approach to networking. As a closer look at the Istio architecture (Figure 1) reveals, the Envoy
13%
11 Tricks for Windows servers
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Kati Molin, Fotolia
to domains. 11. Optimizing DNS Settings for AD The TCP/IP | Properties | Advanced | DNS IPv4 and IPv6 protocols lets you access additional settings to set up name resolution optimally on the network by DNS

« Previous 1 ... 111 112 113 114 115 116 117 118 119 120 121 122 123 124 ... 147 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice