Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 04090 Llorente"52 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (338)
  • Article (125)
  • News (28)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 ... 50 Next »

20%
Getting started with the OpenStack cloud computing framework
28.06.2011
Home »  CloudAge  »  Articles  » 
 
-Manage: novammanage user admin rwartala This process creates an access key and a security key: export EC2_ACCESS_KEY=713211a477a154470fUU ae543346b52e30a0e export EC2_SECRET_KEY=244de6a188aa344e12UU 9521003ac756abbdf
20%
gcc
01.08.2012
Home »  HPC  »  Articles  »  Warewulf Cluste...  »  Warewulf 3 Code  » 
 
compilers/gcc/4.4.6 modulefile #%Module1.0##################################################################### ## ## modules compilers/gcc/4.4.6 ## ## modulefiles/compilers/gcc/4.4.6  Written
19%
Monitoring NFS Storage with nfsiostat
12.03.2013
Home »  HPC  »  Articles  » 
_nor/s rMB_dir/s wMB_dir/s rMB_svr/s wMB_svr/s ops/s rops/s wops/s 192.168.1.250:/home 1230649.19 1843536.81 0.00 0.00 1229407.77 1843781
19%
Distributed storage with Sheepdog
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © kateleigh, 123RF.com
(Listing 3). Listing 3 Defining Replication Factors 01 # dog vdi list 02 Name Id Size Used Shared Creation time VDI id Copies Tag 03 one.img 0 4.0 MB 0.0 MB 0.0
19%
How to configure and use jailed processes in FreeBSD
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Corina Rosu, 123RF.com
, thus creating a routing-enabled jail. The address is passed in on launching the jail. The loopback address (127.0.0.1) and its IPv6 counterpart (::1) can be linked with a jail. This is referred
19%
Resource monitoring for remote applications
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image Gustavo Quepón on Unsplash.com
7:12:50.609 PM POISSON_SERIAL: FORTRAN90 version A program for solving the Poisson equation. -DEL^2 U = F(X,Y) on the rectangle 0 <= X <= 1, 0 <= Y <= 1. F(X,Y) = pi^2 * ( x^2 + y^2 ) * sin
19%
An Image Can Compromise Your Android Device
13.02.2019
Home »  News  » 
 
-found vulnerabilities (CVE-2019-1986, CVE-2019-1987, and CVE-2019-1988) can affect handsets running anything between Android 7.0 Nougat and current Android 9.0 Pie. One of the three vulnerabilities allows a compromised
19%
AlmaLinux 9 Has Officially Been Released
31.05.2022
Home »  News  » 
 
Directly on the heels of the Red Hat Enterprise Linux 9.0 release, the AlmaLinux OS Foundation (the non-profit charged with governing the popular CentOS replacement) has announced the release
19%
LaCie Announces 5big RAID Solution
10.01.2013
Home »  News  » 
 
LaCie has announced the 5big Thunderbolt Series, a massive new five-bay RAID solution. With five 7200rpm/64MB cache hard disks preconfigured in RAID 0, the LaCie 5big offers capacity up to 20TB
19%
REMORA
18.09.2017
Home »  HPC  »  Articles  » 
_SERIAL:   FORTRAN90 version   A program for solving the Poisson equation.      -DEL^2 U = F(X,Y)      on the rectangle 0 <= X <= 1, 0 <= Y <= 1.      F(X,Y) = pi^2 * ( x^2 + y^2 ) * sin ( pi * x * y )      The

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 ... 50 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice