Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1329)
  • Article (336)
  • News (251)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 171 172 173 174 175 176 177 178 179 180 181 182 183 184 ... 192 Next »

9%
MapReduce and Hadoop
27.02.2012
Home »  HPC  »  Articles  » 
(pseudocode): method Reduce(target,counts[c1,c2,...]) sum <- 0 for all c in counts[c1,c2,...] do sum <- sum + c end emit(target,sum) end If you take a look at the schematic, you quickly see
9%
Ceph and OpenStack Join Forces
04.06.2014
Home »  HPC  »  Articles  » 
– in this example: virsh secret-set-value 2a5b08e4-3dca-4ff9-9a1d-40389758d081 AQA5jhZRwGPhBBAAa3t78yY/0+1QB5Z/9iFK2Q== Listing 4: ceph-secret.xml 01  02   2a5b08e4-3dca
9%
VMware Tools
15.10.2013
Home »  Articles  » 
be saved as a blueprint so that other users can produce additional instances of the application when needed. For the first time, the new version 5.0 of vFabric Director is no longer limited to Linux and now
9%
PowerDNS: The Other Open Source Name Server
24.06.2013
Home »  Articles  » 
.conf ) by editing /etc/powerdns/recursor.conf . For brevity’s sake, I only include the configuration variables I have changed herein. allow-from=192.168.1.0/24 #The 'allow-from' address specifies the network address
9%
Access Anywhere with Mobile IPv6
16.04.2013
Home »  Articles  » 
nodes on foreign links can be informed as soon as possible about their new care-of addresses. This interval has been reduced from the original three seconds to 0.03 seconds. This value can be meaningful
9%
Log Management
10.10.2022
Home »  HPC  »  Articles  » 
.logp gpu-manager-switch.log boot.log kern.log dmesg syslog dpkg.log Xorg.0.log dpkg.log   These logs typically have a more or less
9%
Configuring IPv6 in Windows with NetShell
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © James Steidl, 123RF.com
8:affe ::4711": netsh interface ipv6 add route ::/0 "LAN-Connection" \ 2001:db8:affe::4711 You can also look at the routing table outside of NetShell using the route print or netstat -nr commands
9%
Data virtualization using JBoss and Teiid
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © J.R. Bale, 123RF.com
on other Linux systems such as CentOS or Fedora. First, you need to grab the JBoss Data Virtualization software [2]. Then, unpack the JAR archive using java -jar jboss-dv-installer-6.0.0.GA-redhat-4.jar
9%
Cloud-native storage for Kubernetes with Rook
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © efks, 123RF.com
commercially as a replacement for conventional storage. Rook very conveniently came along as free software under the terms of Apache license v2.0. Conclusions The idea behind Rook is not particularly
9%
Best practices for secure script programming
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Jorge Fernández Salas on Unsplash
then create a small shell script (here, itaworker.sh) that contains a Bash-specific for loop: !#/bin/sh for ((i=0; i<3; i++)); do echo "$i" done If you parse this script with checkbashisms, it complains about

« Previous 1 ... 171 172 173 174 175 176 177 178 179 180 181 182 183 184 ... 192 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice