Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1281)
  • Article (341)
  • News (200)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 133 134 135 136 137 138 139 140 141 142 143 144 145 146 ... 183 Next »

13%
Assigning Privileges with sudo and PolicyKit
22.01.2013
Home »  Articles  » 
 
agent. This agent basically consists of an input mask (Figure 3). Each desktop environment can supply its own authentication agent. Figure 3
13%
Profiling Is the Key to Survival
19.12.2012
Home »  HPC  »  Articles  » 
development for several years. In early 2013, the developers from the Institute of Compute Technology (ICT) at the Chinese Academy of Sciences will present the latest development called the Godson-3B
13%
PowerDNS: The Other Open Source Name Server
24.06.2013
Home »  Articles  » 
server (hosting) Resolving DNS server (caching) API to provision zones and records DNSSEC support (as of 3.x) Web-based management options DNS data stored in plaintext (BIND compatible
13%
Parallel Shells: Run Commands on Multiple Nodes
02.07.2014
Home »  HPC  »  Articles  » 
: pdsh -w host[1-11] pdsh -w host[1-4,8-11] In the first case, pdsh expands the host range to host1, host2, host3, …, host11. In the second case, it expands the hosts similarly (host1, host2, host3, host
13%
Intruder Tools
13.12.2011
Home »  Articles  » 
 
), and -t specifies the target directory to download the files. Now open up a web browser and look at the results of the warnerbros.html file (see Figure 3
13%
Cloud Forensics
03.02.2012
Home »  Articles  » 
 
pointed out as early as 2009 a lack of publications on the cloud security problem and on corresponding legal issues [1]. This paucity of information was confirmed by other publications [2] [3]. Despite this
13%
Read-only File Compression with SquashFS
14.06.2017
Home »  HPC  »  Articles  » 
example illustrating the change in file size: $ ls -lsah FS_scan.csv  3.2M -rw-r--r-- 1 laytonjb laytonjb 3.2M 2014-06-09 20:31 FS_scan.csv $ gzip -9 FS_scan.csv  $ ls -lsah FS_scan.csv.gz  268K
13%
Log Management
10.10.2022
Home »  HPC  »  Articles  » 
is installed by default on my Ubuntu 20.04 systems. Listing 1: logrotate $ logrotate --version logrotate 3.14.0       Default mail command:       /usr/bin/mail     Default
13%
Update on Containers in HPC
08.07.2024
Home »  HPC  »  Articles  » 
Shifter Apptainer (formerly Singularity) Sarus Podman Docker Enroot/enroot Kubernetes CRI-O, containerd , Kata NVIDIA/enroot , Pyxis Containers/runc Fuzzball K3s
13%
Deis combines Docker and CoreOS
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © jager, 123RF.com
efficiency, along with simpler management, explains the meteoric rise of Docker [3], LXD [4], OpenStack [5], and other container-based tools: Everything called a "container" is currently very popular

« Previous 1 ... 133 134 135 136 137 138 139 140 141 142 143 144 145 146 ... 183 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice