Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1124)
  • Article (264)
  • News (170)
  • Blog post (9)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 142 143 144 145 146 147 148 149 150 151 152 153 154 155 ... 157 Next »

12%
ISC 2024 from a Distance
10.06.2024
Home »  HPC  »  Articles  » 
HPCG results still had Fugaku in Japan as the number 1 system, which is notable for many reasons, starting with the fact that Fugaku has had the number 1 ranking since it was installed (in 2020
12%
Configuring IPv6 in Windows with NetShell
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © James Steidl, 123RF.com
of the interface, it always has the same interface ID. The Windows system generates this "randomized identifier" once only during the initial installation of the operating system. In contrast to the EUI-64 method
12%
Transport Encryption with DANE and DNSSEC
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © nerhuz, 123RF.com
_tls_loglevel parameter to 1 to obtain this protocol. The DNS Resolver Unbound Unbound [5] is a good DNSSEC-enabled resolver. It is easy to set up, it's quick, and it caches DNS queries. After installation, running
12%
Monitoring, alerting, and trending with the TICK Stack
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Krishna Kumar-Sivaraman, 123RF.com
, and system load). Additionally, various functions let Telegraf monitor services on other systems. Network hardware typically speaks SNMP and outputs data over this interface, but Telegraf cannot be installed
12%
Improved defense through pen testing
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image Photo by Simeon Jacobson on Unsplash
installations of their intrusion detection system (IDS) and security information and event management (SIEM) tools. Not using a 24/7 monitoring company. Interestingly, most of these organizations had good
12%
Cloud-native storage for Kubernetes with Rook
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © efks, 123RF.com
different demands on apps than do conventional setups. Cloud installations assume, for example, that the applications take care of their own redundancy, instead of relying on auxiliary constructs
12%
VMware vRealize management suite for hybrid clouds
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © ucadp, 123RF.com
with a multicloud license from the company. Conclusions VMware vRealize is a typical VMware solution: It is easy to install and run, and its rich feature set delivers a happily-ever-after solution. If you already
12%
mpi4py – high-performance distributed Python
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © liu liming, 123RF.com
Fortran, C, or C++ codes" [4]. Simple mpi4py Examples For the example programs, I used the mpi4py install for Anaconda [5] and built it with MPICH2 [6]. Running mpi4py Python codes follows the MPICH2
12%
Building sustainably safe containers
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © it studiom1, 123RF.com
files from other images. Calling scripts or entire installations might be possible, as well. To create such a container, you would use docker build. To begin, though, copy an archive (usually a .tar
12%
Kubernetes clusters within AWS EKS
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © Zlatko Guzmic, 123RF.com
to make the API endpoint private, you restrict traffic to resources that reside inside the virtual private cloud (VPC) into which you have installed your EKS cluster. However, you can also leave the API

« Previous 1 ... 142 143 144 145 146 147 148 149 150 151 152 153 154 155 ... 157 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice