Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1226)
  • Article (285)
  • News (131)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 112 113 114 115 116 117 118 119 120 121 122 123 124 125 ... 165 Next »

18%
Kafka: Scaling producers and consumers
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Patrick Schneider on Unsplash
.request.size Limit the number and size of batches (record-size-max). Time spent waiting for I/O Are you really waiting (io-wait-ratio)? buffer.memory + queued requests 32MB default (roughly
18%
The pros and cons of a virtual desktop infrastructure
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Mariia Puliaieva, 123RF.com
budget [5] – it's not only the capacity but also the performance that influences user acceptance. The network should not use legacy 10Mb technology, which is often encountered in the form of small
18%
PC over IP
03.09.2013
Home »  Articles  » 
 
. In the Manage Devices section, all Teradici PCoIP devices on the network are detected and listed automatically (Figure 6). Figure 6: Simple but functional
18%
SSH on Windows
17.09.2013
Home »  Articles  » 
with ssh-agent ; the -l option lists the currently stored keys. With the Windows MobaXterm SSH client, you can easily enable the SSH agent, for example, in the program settings (Figure 6). The PuTTY Suite
18%
Supercharge Your Website with Amazon CloudFront
01.04.2014
Home »  Articles  » 
 
then Create New Users ; name the user whatever you would like and click C reate (Figure 6). Figure 6: Creating a new user. Once the user is created, go
18%
OpenStack: Shooting star in the cloud
21.05.2014
Home »  Articles  » 
Stack definitely allows users to collect data on VMs and store the data persistently beyond a restart of the virtual machine. This is where Cinder enters the game (Figure 6): Cinder equips virtual machines
18%
Tricking Intruders with HoneypotMe
26.10.2012
Home »  Articles  » 
 
that the frequently forwarded ports belong to services typically used by malware to infect new systems (Figure 6). Figure 6: Registered attacks on various ports
18%
Two-Factor Authentication
02.04.2013
Home »  Articles  » 
 
any back-end software because it is provided by Vasco in the cloud (see also the “OAuth API” box). Figure 6: The online demo token by Vasco lets users
18%
Ceph Maintenance
12.08.2013
Home »  HPC  »  Articles  » 
.tool The output is given in JSON format (Figure 5), so piping it to python -m json.tool makes the output readable (Figure 6). Figure 5: Performance data queried
18%
Kickstack: OpenStack with Puppet
22.06.2014
Home »  Articles  » 
Stack machines is much more convenient in the built-in Puppet Dashboard than setting up the services manually (Figure 6). If you want to extend your OpenStack installation later to add more computers, you can do

« Previous 1 ... 112 113 114 115 116 117 118 119 120 121 122 123 124 125 ... 165 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice