Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xsede%3 00 Llorente"5432 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (195)
  • Article (97)
  • News (5)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 10 11 12 13 14 15 16 17 18 19 20 21 22 23 ... 30 Next »

19%
Getting Started with HPC Clusters
05.06.2013
Home »  HPC  »  Articles  » 
to build one yourself, or (3) build your own cluster using parts from various sources. However, with the rise of virtualization, you now have more system options than ever, particularly if your budget
19%
Vulnerability scans for containers
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image by Ricardo Gomez Angel on Unsplash
for Internet Security (CIS) [3] – a kind of best practices guide for the use of containers (Figure 1). Figure 1: Docker Bench for Security checks containers
19%
Predicting Drive Doom
20.10.2013
Home »  HPC  »  Articles  » 
: Z1F35P0G LU WWN Device Id: 5 000c50 050b954c3 Firmware Version: CC27 User Capacity: 3,000,592,982,016 bytes [3.00 TB] Sector Sizes: 512 bytes logical, 4096 bytes physical Device is: In smartctl
19%
First steps in IT automation by Rex
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Konstantin Chagin , 123RF.com
on the Rex host and then copy the public key over to the client (Listing 3). After that, a test login on the client without password should work. Listing 3 Key-Based Authentication 01 root
19%
Tips and Tricks for Containers
12.05.2020
Home »  HPC  »  Articles  » 
.04"         ],         "RepoDigests": [             "nvidia/cuda@sha256:3cb86d1437161ef6998c4a681f2ca4150368946cc8e09c5e5178e3598110539f"         ],         "Parent": "",         "Comment": "",         "Created": "2019-11-27T20:00
19%
Setting up an OpenNebula Cloud
05.09.2011
Home »  CloudAge  »  Articles  » 
 
for AWS APIs; therefore, Eucalyptus clouds can scale out to Amazon EC2. Eucalyptus also implements an Amazon S3-compliant storage component called Walrus. Walrus is primarily a virtual machine repository
19%
Read-only file compression with SquashFS
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © modella, 123RF.com
to compress data files. Listing 1 shows a quick example illustrating the change in file size. Listing 1 Gzip Example $ ls -lsah FS_scan.csv 3.2M -rw-r--r-- 1 laytonjb laytonjb 3.2M 2014-06-09 20
19%
Web Cryptography API
26.11.2013
Home »  Articles  » 
ability of web browsers to encrypt and decrypt application data using JavaScript, is currently under review by the World Wide Web consortium (W3C) as a draft. This promising technology reaches well beyond
19%
Machine learning and security
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Vlad Kochelaevskiy, 123RF.com
interacts with the environment as an agent, much like a sentient being (Figure 3). The agent has to explore the environment and typically only learns after a certain number of actions whether
19%
SUSE Goes to Washington:
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Images © Swapnil Bhartiya
, so I attended all three days of the conference and also cast my vote. I was at the venue every morning at 8:00am because, unlike previous years, they didn't have one long keynote on the first day

« Previous 1 ... 10 11 12 13 14 15 16 17 18 19 20 21 22 23 ... 30 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice