Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (159)
  • Article (89)
  • Blog post (1)
  • News (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next »

29%
Creating reports with JasperReports
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Sergey Nivens, 123RF.com
mash "Power Pollen" | 2017 | 399.6 | | Grasshopper trotters, trad. Bav. | 1001 | 646.8 | | Silage sorbet | 113 | 411.3 | | Young
29%
New Monitoring Tools
14.04.2021
Home »  HPC  »  Articles  » 
to “expand” (Figure 2). If you want to reduce the zoom, use the m key to “minimize” (Figure 3). Think of it as zooming in and out in your web browser. If you like, you can zoom in on all the charts
29%
CephX Encryption
27.03.2013
Home »  HPC  »  Articles  » 
/libvirt/secrets (Figure 3). What’s missing is the actual key that libvirt needs for this password. The appropriate command is: virsh secret-set-value 46d801da-7f82-4fa4-92cd-a19e6999d2e6 `ceph-authtool \ --name client ... The RADOS Object Store and Ceph Filesystem: Part 3
29%
Desktop Blades (of Glory)
06.05.2024
Home »  HPC  »  Articles  » 
 Kickstart that raised more than EUR1 million (>$840K). The blades themselves are 255x42.5x17.5mm (length x height x thickness, or roughly 10x1.67x0.7 inches). Figure 3
29%
Storage cluster management with LINSTOR
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © sdecoret, 123RF.com
: resource-definition create --layer-list storage LocalData Now, add a single volume of 150MB to the resource definition named LocalData : volume definition create LocalData 150m Finally, on the cluster
29%
Cross-Vendor IPsec
25.10.2011
Home »  Articles  » 
 
1 05 set remote-gw 192.168.1.31 06 set psksecret ENC kB+sdP4e109vAROdm9TRn9YIzA47T3JHPK4xVOzYu/8nc3wmqBknMZBzfHU7VRuWBF2gncDuHY1ubeCk9DU3zasHi61Izu0m6cg1cdERjgNmKKcO 07 set keepalive
29%
Darshan I/O Analysis for Deep Learning Frameworks
18.08.2021
Home »  HPC  »  Articles  » 
would round this down to one decimal place, or 0.0). Figure 6: Analysis highlights from the darshan-job-summary.pl output PDF. The first snippet
29%
Storage across the network with iSCSI and Synology DiskStation Manager
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © Vladimir Nenov, 123RF.com
. In this case you will select the Quiet Mode Option. The final touch will be to make sure you get alerts when something fails at 3:00am, so you will be notified (or not). The Beep Control option is especially
29%
Favorite benchmarking tools
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © Lucy Baldwin, 123RF.com
, determined an expected value (mean) 1.6ms greater than requested with a standard deviation (sigma) of 0.3ms [7], and reported the range between the minimum and maximum values encountered – handling
29%
Reducing the Attack Surface in Windows
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Sander Sammy on Unsplash
applications from creating child processes No d4f940ab-401b-4efc-aadc-ad5f3c50688a Blocks credential theft from the local security authority subsystem (lsass.exe) Yes 9e6c4e1f

« Previous 1 ... 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice