Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1270)
  • Article (321)
  • News (212)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 139 140 141 142 143 144 145 146 147 148 149 150 151 152 ... 181 Next »

9%
Microsegmentation with VMware NSX and vRealize Automation
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © hketch, photocase.com
. According to VMware documentation, "vRealize Automation generates 255 IP ranges if the subnet mask is 255.255.0.0 and the range subnet mask is 255.255.255.0." Base IP defines the start of the IP address
9%
Integrate remote cloud storage
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © rawintanpin, 123RF.com
it up. After the install, the graphical dashboard (Figure 6) automatically appears in your local web browser. You can call it up again later at any time by typing http://127.0.0.1:5572/ in the address
9%
Purdue Model for industrial networking
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © James Thew, Fotolia.com
represents different aspects and functions within an industrial network. Levels 0, 1, and 2 relate to direct production control. Level 0 includes sensors and actuators that interact directly with the physical
9%
Monitoring Tools for Admins
04.11.2025
Home »  Articles  » 
after breaking it into pieces. Once more, I stopped writing and dropped this article (0 for 2). I took one final swing at having AI tell me what it thought the important issues were in HPC. This time I
9%
Centralized software repository management
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© 1xpert, 123RF.com
Type yum 10 Arch noarch 11 Sync Schedule 10 0 * * * 12 Packages 10 13 Files 0 14 Distributions None 15 Publish True 16 Clones
9%
State-of-the-art virtual private networks
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Maxim Kazmin, 123RF.com
encryption in SSL 3.0 ensures maximum security and performance. SSTP VPNs are thus a class of SSL VPNs, like Cisco's WebVPN or the Vigor Router by Draytek, that basically work in the same way as IPsec, L2TP
9%
Find Entra ID vulnerabilities with AzureADRecon
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Ricardo Gomez Angel on Unsplash
ADRecon Prerequisites .NET Framework 3.0 or newer (included in Windows 7 and later) PowerShell 2.0 or newer (included in Windows 7 and later) AzureAD PowerShell Module 3.0 or newer – installable
9%
Parallel Versions of Familiar Serial Tools
28.08.2013
Home »  HPC  »  Articles  » 
). You can specify the number of threads to use and the block size, as in this example, % pbzip2 -p 8 -b15vk massivetarball.tar which uses eight threads and a block size of 1500KB (1.5MB). A second
9%
Profiling Is the Key to Survival
19.12.2012
Home »  HPC  »  Articles  » 
has the following specifications: 4 cores at 3.8GHz (turbo to 4.2GHz) 4MB L2 cache 384 Radeon cores 800MHz GPU clock speed DDR3 1866MHz memory 100W Putting both the CPU
9%
What is an IOPS Really?
24.02.2022
Home »  HPC  »  Articles  » 
 MB p s  or Peak IOPS is  x . However, what does “IOPS” really mean and how is it defined? Typically, an IOP is an I/O operation, wherein data is either read or written to the filesystem

« Previous 1 ... 139 140 141 142 143 144 145 146 147 148 149 150 151 152 ... 181 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice