Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xsede%3 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1355)
  • Article (345)
  • News (204)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 184 185 186 187 188 189 190 191

13%
Getting Data Into and Out of the Cluster
14.08.2023
Home »  HPC  »  Articles  » 
storage that uses other protocols, such as Amazon Web Services (AWS) Simple Storage Service (S3) buckets, NFS, Google Drive, Microsoft OneDrive, Backblaze, SFTP and SSHFS, Nextcloud, and others. All
13%
Vulnerability assessment best practices for enterprises
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Photo by Fancycrave on Unsplash
after the scanning process. (3) They are designed to discover known vulnerabilities only. They cannot identify other security threats, such as those related to physical, operational, or procedural issues
13%
Run your own chat server
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Volodymyr Hryshchenko on unsplash
: 0.0.0.0 port: 29318 database: type: sqlite3 uri: whatsapp.db Additionally, you need to configure the permissions setting to match your domain so that only users from your domain
13%
Log analysis in high-performance computing
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Kier… in Sight on Unsplash
hope to orient you in the correct direction for deploying a log analysis capability. Splunk Although I'm a big supporter of open source, Splunk [3], a commercial product, is probably the gold standard
13%
Kafka: Scaling producers and consumers
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Patrick Schneider on Unsplash
.a.k.c.FetchSessionHandler:438 - [Consumer clientId=consumer-1, groupId=jesseyates.kafka.mirror] Error sending fetch request (sessionId=INVALID, epoch=INITIAL) to node 3: org
13%
Nothing works without a profile
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © abidal, 123RF.com
the requirements for environments with folder redirection [3]. Starting Points Basically, UEM tools have two ways to enable backing up and restoring configuration data. With the "external method," the UEM has
13%
Storage trends for taming the flood of data
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © Natalia Lukiyanova, 123RF.com
: the Zenoh data protocol [3]. This network protocol is expected to play a similarly important role in data transport to IP in the development of the Internet as Kafka does today for real-time data streaming
13%
The pros and cons of a virtual desktop infrastructure
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Mariia Puliaieva, 123RF.com
shares, including vWorkspace [3] and Pano Logic [4]. What VDI Means When you consider all the benefits, you might expect virtual desktops to be used in environments at least a few dozen clients
13%
ASM tools and strategies for threat management
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © tarokichi, 123RF.com
of vulnerabilities, so they can be analyzed and continuously monitored. Gartner [3] includes Armis, Axonius, Balbix, JupiterOne, Lansweeper, OctoXLabs, runZero, and ThreatAware in its list of CAASM providers

« Previous 1 ... 184 185 186 187 188 189 190 191

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice