Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (544)
  • Article (132)
  • News (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 10 11 12 13 14 15 16 17 18 19 20 21 22 23 ... 68 Next »

15%
OpenLDAP Workshop
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © tiero, 123RF.com
user for the first time. The following command parses the LDIF file: $ ldapadd -x -W -D cn=manager,dc=acme-services,dc=org -f base.ldif Notice that now this command no longer needs the root user ... Centralized user management with LDAP or Active Directory is the standard today, although many prefer to manage user data manually rather than build this kind of infrastructure. In this article, we
15%
Live migration of virtual machines
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Michael Edward, 123RF.com
the wheat from the chaff. Games Without Frontiers A few years ago, an archetypal demo setup, in which players of the 3D first-person shooter Quake 3 didn't even notice that the VM and its server had moved
15%
News for Admins
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
 
administrators, we continue to reinforce Linux as the bedrock for enterprise digital transformation." For more information about Red Hat Enterprise Linux 8.3, read the official release notes (https://access.redhat.com ... In the news: Red Hat Enterprise Linux 8.3 Available, It's Official – Linux 5.10 is the Next LTS Kernel, System76 Unleashes World's Smallest Quad-GPU Workstation, Canonical Releases Autonomous
15%
Live Migration
18.02.2014
Home »  Articles  » 
the wheat from the chaff. Games Without Frontiers A few years ago, an archetypal demo setup, in which players of the 3D first-person shooter Quake 3 didn’t even notice that the VM and its server had moved
15%
Continuous upgrades for Windows 10
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © golffoto, photocase.com
-to-speech or handwriting recognition). These packages must also be integrated for deployment in the enterprise. Third-Party Stumbling Blocks Administrators usually have the fewest possibilities in terms of active ... The new Windows 10 update strategy, called an in-place upgrade, requires some manual adjustments for third-party components, as well as accommodations for multilingual and non-English enterprises.
15%
CrowdSec crowd security service
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Dan Burton on Unsplash
the servers to the console through the agent. (3) Use "bouncers" to prevent attacks actively, wherein the system simply blocks certain IP addresses. Typically, you can use the package manager to install Crowd ... Threats can be detected and averted at an early stage with crowd security, in which organizations form a community to take concentrated action against cyberattacks by sharing attack data. We explain
15%
Resource Management with Slurm
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Vladislav Kochelaevs, fotolia.com
In previous articles, I examined some fundamental tools for HPC systems, including pdsh [1] (parallel shells), Lmod environment modules [2], and shared storage with NFS and SSHFS [3]. One remaining ... One way to share HPC systems among several users is to use a software tool called a resource manager. Slurm, probably the most common job scheduler in use today, is open source, scalable, and easy
15%
HDF5 and Parallel I/O
17.05.2017
Home »  HPC  »  Articles  » 
_DATASET_CREATE_F, DCPL, IERR) 63   64         ! This is required for this data pattern 65         CALL H5Pset_alloc_time_f(DCPL, H5D_ALLOC_TIME_EARLY_F, IERR) 66      67         ! Create each dataset with default properties 68
14%
Solving the security problems of encrypted DNS
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Leo Blanchette, 123RF.com
Rainer W. Gerling ... 2fuTVWnj7LDsEh3NzrhjGYlhWmtvrXg3mlFelz/MZ 08 XrK6uAlp6206Hc669ylfhIcD9d7w0rc9Ms1DFCh5wzVRbnJJF51mW2nC 09 mh5C8E7xSw== 10 mozilla.org. 6074 IN DNSKEY 256 3 7 11 AwEAAcY1VDPt
14%
Extended File Attributes
20.04.2022
Home »  HPC  »  Articles  » 
of extended file attributes. The attributes are usually in a key-value format. The attributes have a name (the key) and some associated data (the attribute or “value”). The name starts with what is called

« Previous 1 ... 10 11 12 13 14 15 16 17 18 19 20 21 22 23 ... 68 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice