Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1285)
  • Article (342)
  • News (220)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 152 153 154 155 156 157 158 159 160 161 162 163 164 165 ... 186 Next »

13%
Client management in the domain using PowerShell
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Maurizio Ascione, Fotolia.com
"name = '$drucker'"; $status = $ObjWMI.Printer.Status switch ($status) { "3" {"Printer is ready"} "4" {Printer working"} "5" {"Printer starting up"} "6" {"Print job finished"} "7" {"Printer is offline
13%
Features of PowerShell loops
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © bowie15, 123RF.com
an if condition to test whether the object given to it is a file (Figure 3). If not, the continue statement is executed and the next iteration is triggered. Program execution jumps back to the loop head and reads
13%
Working with objects in PowerShell
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © Philip Kinsey, 123RF.com
values from this output, you need to turn to filter programs like awk, grep, or sed. PowerShell offers a cmdlet Get-NetIPConfiguration that basically outputs the same data (Figure 3). But because objects
13%
Hadoop for Small-to-Medium-Sized Businesses
06.05.2014
Home »  HPC  »  Articles  » 
, but this solution also lacked robust replication at the time of implementation. Openfiler dropped out of the shortlist, because the system took several days to complete a rebuild of only 3TB of data. Cloud
13%
Fathoming the cloud
28.06.2011
Home »  CloudAge  »  Articles  » 
 
is based on the CSA Security Guidance document [3]. The CSA Security Guidance, in turn, is designed to provide high-level coverage of cloud security issues and some methods to address them, ranging from
13%
Operating system virtualization with OpenVZ
28.06.2011
Home »  CloudAge  »  Articles  » 
 
using Linux-Vserver [1], OpenVZ [2], or Virtuozzo [3]. Benefits Hypervisor-based virtualization solutions emulate a complete hardware layer for the guest system; ideally any operating system including
13%
Magellan Report on Cloud Computing
15.02.2012
Home »  HPC  »  Articles  » 
communication and I/O are best suited for clouds. Finding 3. Clouds require significant programming and system administration support. Finding 4. Significant gaps and challenges exist in current open
13%
Prolog and Epilog Scripts
07.07.2021
Home »  HPC  »  Articles  » 
and performance of the user’s workload, I don’t see a problem using it. Example 3: Setting Temporary I/O Directories Very close to the previous example is one that creates temporary directories for the user
13%
PowerShell add-on security modules
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
– or the entire network of a company – has been compromised, the cause of the attack and the underlying vulnerability must be identified. PowerShell is supported by the PowerForensics module [3], which helps
13%
News for Admins
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
 
personal details, but a bug in the software allowed all information to be displayed, including social security numbers. The bug was introduced when the website, managed by the EPA, was upgraded to version 3

« Previous 1 ... 152 153 154 155 156 157 158 159 160 161 162 163 164 165 ... 186 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice