Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1339)
  • Article (315)
  • News (203)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 170 171 172 173 174 175 176 177 178 179 180 181 182 183 ... 186 Next »

9%
VMware Tools
15.10.2013
Home »  Articles  » 
performance monitoring at the application level is only possible after the integration of vFabric Hyperic 5.6. Infrastructure Navigator vCenter Operations Manager provides extensive reporting and analysis
9%
Automating with Expect Scripts
12.11.2012
Home »  Articles  » 
 
@trapper:~\$ " send -- "ssh aspen\r" expect -exact "ssh aspen\r khess@aspen’s password: " send -- "PASSWORD\r" expect -exact "\r Linux aspen 2.6.32-43-server #97-Ubuntu SMP Wed Sep 5 16:56:41 UTC 2012 x86_64 GNU
9%
Linux Essentials for Windows Admins – Part 1
10.07.2012
Home »  Articles  » 
 
value of 644 (rw (6 )-r (4 )--r (4 )-- ). What is the permission value of a file that has the following permissions? rwxrw-r-- The correct answer is 764 . What about for the read-only file (r
9%
GlusterFS Storage Pools
17.11.2016
Home »  HPC  »  Articles  » 
pool or storage domain for some time. Qemu can access the disk directly without having to detour via a FUSE mount, thanks to integration of the libgfapi  library in GlusterFS version 3.4 [6]. Performance
9%
SSHFS for Shared Storage
15.09.2020
Home »  HPC  »  Articles  » 
@openssh.com arcfour arcfour128 arcfour256 blowfish-cbc cast128-cbc chacha20-poly1305@openssh.com As of OpenSSH 7.6, the arcfour , blowfish , and cast ciphers have been removed. Some
9%
Why Good Applications Don’t Scale
13.10.2020
Home »  HPC  »  Articles  » 
: The serial fraction can be broken into two parts (Equation 6), where s B is the base serial fraction that is not a function of the number of processors, and s C is the communication time between processors
9%
Tools to Manage Storage
03.02.2024
Home »  HPC  »  Articles  » 
                                938G  718G  173G  81% /home /dev/nvme0n1p1                                511M  6.1M  505M   2% /boot/efi /dev/sda1                                     5.5T  3.1T  2.1T  60% /home2 192.168.4.100:/home
9%
Protecting documents with Azure Information Protection
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Aleksey Mnogosmyslov, 123RF.com
line. The AADRM PowerShell module [6] is available for this purpose. Before you get started, you need to connect the PowerShell session to AIP using the Connect-AadrmService cmdlet (Figure 2). Without
9%
Monitoring, alerting, and trending with the TICK Stack
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Krishna Kumar-Sivaraman, 123RF.com
[6]: In a MAT system based on InfluxDB, this service collects the metrics on the servers and passes them to InfluxDB for storage. Telegraf (Figure 3) is similar to Prometheus Node Exporter in the same
9%
Cloud-native storage for Kubernetes with Rook
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © efks, 123RF.com
comes in the form of Kubernetes pods. You can find example files on GitHub [6] that start these pods. The operator namespace contains all the components required for Rook to control Ceph. The cluster

« Previous 1 ... 170 171 172 173 174 175 176 177 178 179 180 181 182 183 ... 186 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice