Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1271)
  • News (421)
  • Article (310)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 171 172 173 174 175 176 177 178 179 180 181 182 183 184 ... 201 Next »

12%
Simplify your migration from Docker to Podman
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Oli Zubenko on Unsplash
. Licensing Hassle at Docker What kicked off the far-reaching changes to the licensing policy was the acquisition of Docker Inc. by Mirantis in November 2019. The provider now relies on a subscription model
12%
Total Network Monitor
20.08.2013
Home »  Articles  » 
 
devices and arrange your equipment to provide a good overview. In map view, you can also add or remove devices, just as in the normal tree view. Integrating Servers and Services To monitor servers
12%
Managing Cluster Software Packages
12.02.2013
Home »  HPC  »  Articles  » 
provides easy management of various versions and packages in a dynamic HPC environment. One of the issues, however, is how to keep your Modules environment when you use other nodes. If you use ssh to log
12%
SHA-3 – The New Hash Standard
15.04.2013
Home »  Articles  » 
 
.2 or 2.4 version of the Apache web server – using the SSLProtocol configuration option. Listing 1 provides a potential server configuration. Listing 1: Apache Configuration SSLProtocol -SSLv2 +SSLv3
12%
How to Hide a Malicious File
09.01.2012
Home »  Articles  » 
 
that will not match the available antivirus signatures. The Metasploit penetration testing framework provides a collection of tools you can use to test a network by attacking it the way an intruder would attack it
12%
Distributed Linear Algebra with Mahout
11.05.2022
Home »  HPC  »  Articles  » 
-oriented software engineers will enjoy the simplified Samsara domain-specific language (DSL), which provides a stripped-down syntax that feels natural to people accustomed to writing with math notation, avoiding
12%
IO500
02.02.2025
Home »  HPC  »  Articles  » 
. Scoring IO500 takes the various scores and combines them into a single number, which is then used to rank the solutions. I don’t know how they combine them, but they provide raw scores that can be use
12%
iSCSI: Set up and use LIO targets
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Volodymyr Krasyuk, 123RF.com
for this; it provides the iscsiadm command. The iSCSI initiator needs a configuration that in turn assigns at least one IQN. However, the operating system can generate this itself. For discovery
12%
Testing the Samsung MU-PA500B 500GB SSD
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Lucy Baldwin, 123RF.com
the drive will provide under a high write load. Figure 2: Gnome Disks benchmark (1,000 10MiB samples) running on the Samsung T5. Note the garbage collection
12%
Choosing between the leading open source configuration managers
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Giuseppe Ramos, 123RF.com and Paulus Rusyanto, Fotolia.com
setup is based on a central server that provides its surrounding hosts with data. The host is known as the Puppet master server; all agents on all your computers call it to obtain information about

« Previous 1 ... 171 172 173 174 175 176 177 178 179 180 181 182 183 184 ... 201 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice