Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1018)
  • News (227)
  • Article (221)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 137 138 139 140 141 142 143 144 145 146 147 Next »

12%
Centralized Password Management
06.08.2013
Home »  Articles  » 
 
130,000 university staff and students and operates the Munich Scientific Network with around 110,000 devices. To manage the mass of passwords for servers and services operated at the LRZ
12%
Safe Files
16.04.2015
Home »  HPC  »  Articles  » 
of the file. Also don’t forget that as part of the extraction, p7zip also uncompresses the file. OpenSSL SSL and its successor TLS were protocols developed to provide communication security over a network
12%
pdsh Parallel Shell
08.07.2018
Home »  HPC  »  Articles  » 
would allow it to be reassembled much more easily. Another technique for using pdsh is to run scripts on each node. For example, in previous articles on processor and memory metrics and process, network
12%
More Best Practices for HPC Containers
19.02.2020
Home »  HPC  »  Articles  » 
of encryption for filesystems and networking. If you struggle to understand fakeroot, then understanding the filesystem implications might help. A fakeroot user can neither access nor modify files
12%
Processor Affinity for OpenMP and MPI
13.10.2021
Home »  HPC  »  Articles  » 
their applications run faster, hence the moniker “High Performance.” With today’s complex systems with lots of cores, network interfaces, accelerators, memory channels, and local storage, finding combinations
12%
History and use of the mail utility
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Vlad Kochelaevskiy, fotolia.com
to show how similar the two commands are for comparison. For example, to speak to someone on the same machine, you could use: # talk pepper If networking of some sort were present, you could use
12%
Data Analysis with R and Python
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © mopic, 123RF.com
and operators. The Comprehensive R Archive Network (Cran [5]) also offers many modules for R. R Interface The sample application uses the Python Rpy2 [6] package as an interface to R. Rpy2 passes in the data
12%
Lean on Logwatch
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © MuharremZengin, 123RF.com
(i.e., networked devices) to be in one email report, then the following change in your config file will split up the entries by hostname: SplitHosts = yes In this case, do not limit hosts with Host
12%
Collaborative online office solutions
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Photo by Truong Trung Cap Kinh Té Du Lich Thành Pho Ho Chí Minh CET on Unsplash
such as Nextcloud or ownCloud. Some network-attached storage (NAS) systems also come with suitable apps in their software stores. You don't necessarily need dedicated servers for collaborative editing. Sometimes
12%
Fast and scalable ownCloud Infinite Scale
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Markus Spiske on Unsplash
brings about some challenges to the underlying network, and the oCIS developers have chosen the Traefik framework [7] to tackle those. Traefik automatically load balances between the different instances

« Previous 1 ... 137 138 139 140 141 142 143 144 145 146 147 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice