Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1076)
  • News (230)
  • Article (226)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 125 126 127 128 129 130 131 132 133 134 135 136 137 138 ... 154 Next »

12%
HPC fundamentals
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Kasia biel, 123RF.com
easily. Another technique for using pdsh is to run scripts on each node. For example, in previous articles on processor and memory metrics [4] and on process, network, and disk metrics [5], scripts were
12%
Storage trends for taming the flood of data
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © Natalia Lukiyanova, 123RF.com
, the request first passes through many routers to its destination. All told, this generates massive overhead, especially in terms of energy consumption for communication. The more branches the network has
12%
Hacking Mutillidae II
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by USGS on Unsplash
, and networks), all of which fire up containers to run the respective services. To do just that, use the command: $ docker-compose up -d Incidentally, the -d runs the containers in the background, or daemonizes
12%
Setting up SSL connections on Apache 2
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
pnphoto, 123RF
. Tap-Proof TLS and SSL are cryptographic network protocols. (Actually, they are collections of several protocols.) TLS encrypts the data provided by the browser and then sends the data to a web
12%
SSH tools for Windows
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Maksim Kabakou, 123RF.com
SourceForge [12], and the current version is 0.74 (see also the "WinSSH" box). Installing the executable binary needs no explanation; no launcher is needed because Swish simply appears as a new network
12%
Detecting system compromise
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Nah Ting Feng, 123RF.com
used for local decisions about a system but become much more powerful as a means of projecting trust across a network when integrity evidence can reliably be presented as input to remote security
12%
Warewulf Cluster Manager – Administration and Monitoring
21.08.2012
Home »  HPC  »  Articles  » 
of slapping some boxes together with a network and calling it a day. This might work with flashmob computing, but if you've followed this series, you realize this is not the usual case. If you want to put
12%
Processor and Memory Metrics
12.02.2014
Home »  HPC  »  Articles  » 
, network, and disk – but in this article, I will look at processor and memory metrics. For each metric, I present a simple script or two; virtually all of the scripts create more than one metric. Processor
12%
Data Visualization Tools
07.01.2014
Home »  Articles  » 
to processor utilization, Conky can display and visualize much more system information, including incoming and outgoing network traffic and memory requirements. The tool logs incoming email and even lets you
12%
Red Hat Storage Server 2.1
05.03.2014
Home »  Articles  » 
Software Defined Storage (SDS) is gaining popularity within the IT community. An SDS system is similar to a Storage Area Network (SAN) system, except, rather than operating on specialized

« Previous 1 ... 125 126 127 128 129 130 131 132 133 134 135 136 137 138 ... 154 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice