Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (158)
  • Article (87)
  • Blog post (1)
  • News (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next »

29%
Getting Started with HPC Clusters
05.06.2013
Home »  HPC  »  Articles  » 
2.6GHz quad-core processor with AMD Radeon HD 6530D graphics 1 $69.99 $69.99 ASRock A75 PRO4-M FM1 motherboard microATX Socket FM1 motherboard; 4x240-pin DDR3 2400
29%
New features in the Bareos Bacula fork
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Maxim Kazmin, 123RF.com
Status Director *status director ... Terminated Jobs: JobId Level Files Bytes Status Finished Name ===================================================== 1 Full 135 6.679 M OK 18-Jul-13 16:00 Backup
29%
ASCII-based monitoring tools
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © tele52, 123RF.com
to reduce the zoom, use the m key to "minimize" (Figure 3). Think of it as zooming in and out in your web browser. If you like, you can zoom in on all the charts with the plus (+ ) key. Likewise, you can
29%
Exploiting, detecting, and correcting IAM security misconfigurations
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Kyle Head on Unsplash
security misconfigurations. I'll showcase how it would be possible for an attacker to use those IAM misconfigurations and create serious hassles. Big Deal? AWS IAM [3] lets you manage access to AWS
29%
Darshan I/O analysis for Deep Learning frameworks
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Michaela Murphy on Unsplash
0.499MiB of data (the code would round this down to one decimal place, or 0.0). Figure 6: Analysis highlights from the darshan-job-summary.pl output
29%
Cloud protection with Windows Azure Backup
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Oleksiy-Mark, 123RF.com
:\Program Files (x86)\Windows Kits\8.0\bin\x64 directory. You can create a certificate like this: makecert.exe -r -pe -nCN= -ssmy -sr localmachine-eku \ 1.3.6.1.5.5.7.3.2 -len 2048 -e01
29%
OpenStack installation with the Packstack installer
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Tom Wang, Fotolia.com
-system state UP qlen 1000 link/ether 52:54:00:6b:55:21 brd ff:ff:ff:ff:ff:ff inet6 fe80::5054:ff:fe6b:5521/64 scope link valid_lft forever preferred_lft forever Listing 4 Querying
29%
Creating reports with JasperReports
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Sergey Nivens, 123RF.com
mash "Power Pollen" | 2017 | 399.6 | | Grasshopper trotters, trad. Bav. | 1001 | 646.8 | | Silage sorbet | 113 | 411.3 | | Young
29%
New Monitoring Tools
14.04.2021
Home »  HPC  »  Articles  » 
to “expand” (Figure 2). If you want to reduce the zoom, use the m key to “minimize” (Figure 3). Think of it as zooming in and out in your web browser. If you like, you can zoom in on all the charts
29%
CephX Encryption
27.03.2013
Home »  HPC  »  Articles  » 
/libvirt/secrets (Figure 3). What’s missing is the actual key that libvirt needs for this password. The appropriate command is: virsh secret-set-value 46d801da-7f82-4fa4-92cd-a19e6999d2e6 `ceph-authtool \ --name client ... The RADOS Object Store and Ceph Filesystem: Part 3

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice