Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xsede%3 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1285)
  • Article (342)
  • News (200)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 157 158 159 160 161 162 163 164 165 166 167 168 169 170 ... 184 Next »

13%
Access Anywhere with Mobile IPv6
16.04.2013
Home »  Articles  » 
. It is used by all the parties (i.e., the mobile node, correspondent node, and home agent) in messages that have to do with the management and updating of bindings. Figure 3 shows the configuration
13%
Floodlight: Welcome to the World of Software-Defined Networking
15.10.2013
Home »  Articles  » 
. One of the standard applications that relies on the REST API is Floodlight’s own GUI (Figure 3). Additionally, a Python-based Circuit Pusher automatically installs persistent OpenFlow rules
13%
Visualize Your Network
27.10.2011
Home »  Articles  » 
 
-friendly statistics that might be more suited to the less technical minded. Figure 3 shows MRTG Total Traffic Generator with some slightly modified output. Although it hasn’t been maintained since 2002, with only some
13%
Web and Mail Servers with IPv6
13.12.2011
Home »  Articles  » 
 
 , offers a test page where you can test your dual-stack connectivity (Figure 3). Figure 3: The Dual Stack Connectivity Chart offered by RIPE NCC [1] tells you
13%
Wireshark
27.11.2011
Home »  Articles  » 
 
then select Capture | Stop to stop recording, and Wireshark will display all of the packets it has captured (Figure 3). Figure 3: Launching Wireshark without
13%
URL Tricks with htaccess
02.02.2012
Home »  Articles  » 
 
) could manipulate your redirections effectively through a browser, just like the aforementioned public services. An almost painfully simple htaccess file looks like that in Figure 3, demonstrating the 301
13%
Getting Ready for the New Ceph Object Store
19.05.2016
Home »  HPC  »  Articles  » 
(Figure 3). In the future collaboration with it-novum, SUSE is looking to improve the Ceph plugin for openATTIC and extend it to include additional features. In the long term, the idea is to build a genuine
13%
Useful NFS Options for Tuning and Management
15.06.2016
Home »  HPC  »  Articles  » 
client and server TCP stacks. In this article, I've broken the list of tuning options into three groups: (1) NFS performance tuning options, (2) system tuning options, and (3) NFS management/policy options
13%
Shared Storage with NFS and SSHFS
12.09.2018
Home »  HPC  »  Articles  » 
). To make sure everything is installed correctly, you can simply try the sshfs -V command as a user (no root needed): $ sshfs -V SSHFS version 2.5 FUSE library version: 2.8.3 fusermount version: 2.8.3 using
13%
SSHFS for Shared Storage
15.09.2020
Home »  HPC  »  Articles  » 
or decryption of data. The ciphers supported in OpenSSH 7.3 are: 3des-cbc aes128-cbc aes192-cbc aes256-cbc aes128-ctr aes192-ctr aes256-ctr aes128-gcm@openssh.com aes256-gcm

« Previous 1 ... 157 158 159 160 161 162 163 164 165 166 167 168 169 170 ... 184 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice