Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1201)
  • Article (331)
  • News (166)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 134 135 136 137 138 139 140 141 142 143 144 145 146 147 ... 171 Next »

23%
SSH on Windows
17.09.2013
Home »  Articles  » 
username> @ PuTTY uses the puttygen.exe (PuTTY Key Generator) tool (instead of ssh-keygen ) to generate RSA (default) or DSA key pairs (Figure 4
23%
HPC Monitoring: What Should You Monitor?
15.01.2014
Home »  HPC  »  Articles  » 
submitted jobs (the peak was around 4:00pm, and the low point was around 6:00-7:00am). Just imagine having that information about your cluster. If you use a charge-back model, you could charge more to submit
23%
Supercharge Your Website with Amazon CloudFront
01.04.2014
Home »  Articles  » 
 
: Creating a CloudFront distribution. Figure 3: Origin settings. Adding a CNAME Stop at Alternate Domain Names (CNAMEs) settings (Figure 4
23%
OpenStack: Shooting star in the cloud
21.05.2014
Home »  Articles  » 
to work as it should. Incidentally, if you have worked with OpenStack in the past, you might be familiar with Neutron under its old name, Quantum (Figure 4). (A dispute over naming rights in the United
23%
PowerShell Part 2: Manipulating Services, Processes, and Commands
17.04.2012
Home »  Articles  » 
 
Local Area Connection 4: Connection-specific DNS Suffix . : gateway.2wire.net Description . . . . . . . . . . . : Citrix PV Ethernet Adapter Physical Address. . . . . . . . . : 5A-65-68-CB-55
23%
Refurbished: Windows 2012 Active Directory
10.12.2012
Home »  Articles  » 
 
in PowerShell 3.0 is the show-command commandlet, which opens a new window with all the PowerShell commands that are available (Figure 4). Figure 4: Power
23%
Two-Factor Authentication
02.04.2013
Home »  Articles  » 
 
Authenticate with Google Authenticator app ; then, in the app again, tap the plus sign and scan the QR code on the screen. After entering the one-time password, two-factor authentication is enabled (Figure 4
23%
The Cloud’s Role in HPC
05.04.2013
Home »  HPC  »  Articles  » 
of 11 hours) and cost US$ 4,362. This is $0.4115 per instance for 11 hours, or $0.037 per instance per hour. For the researcher that needs to run 25,000 instances at the same time, on the basis of Cycle
23%
Red Hat’s Cloud Tools
08.07.2013
Home »  Articles  » 
 
Provider where needed. After completing the official beta phase last November, OpenShift (Figure 4) is now available as a commercial product under the name OpenShift Enterprise and rounds off Red Hat
23%
Floodlight: Welcome to the World of Software-Defined Networking
15.10.2013
Home »  Articles  » 
Flow island can only have exactly one connection to non-OpenFlow equipment. Furthermore, OpenFlow and non-OpenFlow islands must not form a loop themselves. Figure 4 shows a potential topology that allows

« Previous 1 ... 134 135 136 137 138 139 140 141 142 143 144 145 146 147 ... 171 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice