Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (978)
  • Article (305)
  • News (84)
  • Blog post (7)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 125 126 127 128 129 130 131 132 133 134 135 136 137 138 Next »

27%
Kick-start your AI projects with Kubeflow
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © austler, 123RF.com
setting, you will very quickly generate horrendous bills. According to the process described, a Kubeflow installation can be set up from scratch at any time. The important thing is to reset config
27%
Better monitoring for websites and certificates
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © amasterpics123, 123RF.com
for this purpose. With three sites to monitor, this task is no problem, but with 200 sites, it certainly is. Checkmk offers two possible approaches: macros and individual endpoints. Multiple endpoints are very
27%
Anonymization and pseudonymization of data
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Debby Ledet on Unsplash
to prevent identifiability. This method is particularly useful if certain attributes are very specific and therefore identifiable. For example, you can replace the last four digits of an ID with XXXX
27%
Warewulf 4 – Time and Resource Management
17.01.2023
Home »  HPC  »  Articles  » 
, especially if you are going to use several containers. The first step is to create the users slurm  and munge  in the container along with their groups before installing anything. This part is very critical
27%
Security data analytics and visualization with R
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Rancz Andrei, 123RF.com
of this attack, including a description, walk-through, and exploit is available at Exploit-DB [11]. Over the years, I've made use of a Perl script that reduces very long W3C Apache log entries down to just
27%
Building a HPC cluster with Warewulf 4
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Andrew Ly on Unsplash
several containers. The first step is to create the users slurm and munge in the container along with their groups before installing anything. This part is very critical: the user ID (UID) and group ID
27%
An open source object storage solution
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Pat Whelen on Unsplash
hash algorithm if you have specific performance or security requirements. For larger deployments, you should definitely use MinIO in a distributed mode to scale across multiple nodes. In very rough
27%
VM and cloud management with openQRM
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Jason Murillo, 123RF.com
Virtualization with KVM OpenQRM already comes with a very powerful hypervisor in the form of KVM, on the basis of which I will now be provisioning a couple of virtual machines as examples. Please note that if you
27%
Speed up your MySQL database
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Mikhail Dudarev, 123RF.com
. If the table does not have a primary key, it is not very elegant from an academic point of view, but it also affects performance (e.g., during replication). In the case of InnoDB tables, you need to pay
27%
New features in MariaDB 10.3
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image by Adarsh Kummur on Unsplash
of very large columns (e.g., BLOB, TEXT, VARCHAR, VARBINARY, JSON): SQL> CREATE TABLE mail ( subject VARCHAR(255) , body VARCHAR(255) , attachment LONGBLOB COMPRESSED , metadata JSON COMPRESSED

« Previous 1 ... 125 126 127 128 129 130 131 132 133 134 135 136 137 138 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice