Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1203)
  • Article (281)
  • News (138)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 13 14 15 16 17 18 19 20 21 22 23 24 25 26 ... 163 Next »

18%
Tips and Tricks for Containers
12.05.2020
Home »  HPC  »  Articles  » 
68e152db7e5bb36b1cca638",                 "sha256:37b9a4b2218692d028f9f26aa9cb85bf1f56d9abe612ba31304643bdb448484f",                 "sha256:b16af11cbf2977eb52ba4d6cee5b713721cc19812b8c90ea1f22e7e
18%
Denial of Service in the Cloud
12.11.2013
Home »  Articles  » 
Gbps. Figure 1: Spamhaus, an organization that fights spam by issuing blacklists, fell prey to a DDoS attack on the Internet. Innocent users whose
18%
Simplify integration of S3 storage with local resources
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Photo by Christopher Burns on Unsplash
from the AWS AMI Marketplace. However, deploying the OVA file under ESXi 6.5 in the web client did not work out of the box to an invalid manifest file, although it was no problem to deploy directly
18%
Distributed denial of service attacks from and against the cloud
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © leksustuss, 123RF.com
300Gbps [2]. Innocent users whose addresses had been added to blacklists had no way of asking for their entries to be deleted during the attack. Innocent domains thus remained blocked and many
18%
A Hands-on Look at Kubernetes with OpenAI
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Luxuz, photocase.com
. The company relies on Docker containers [5] and Kubernetes [6] to master this balancing act between usability and performance. Containers let you describe all the dependencies and packages (e.g., TensorFlow [7
18%
Remote desktop based on HTML5
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Phanlop Boonsongsomnukool, 123RF.com
the AGPLv3 and, in the current version 0.6.2, supports VNC and RDP  – although with limited functionality in some cases. For example, you cannot transmit audio data or connect network drives over RDP
18%
SmartOS as a virtualization platform
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Paulus NR, 123RF.com
": 2048, 07 "resolvers": ["192.168.111.254"], 08 "disks": [ 09 { 10 "image_uuid": "1fc068b0-13b0-11e2-9f4e-2f3f6a96d9bc", 11 "boot": true, 12 "model": "virtio" 13 } 14 ], 15
18%
Julia: A New Language For Technical Computing
31.05.2012
Home »  HPC  »  Articles  » 
,383.80 225.23 1.55 parse_int 1.44 16.50 815.19 6,454.50 337.52 2.17 quicksort 1.49 55.84 132.71 3,127.50 713
18%
The practical benefits of network namespaces
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Morganimation, fotolia.com
for production, since kernel 2.6.24. In container solutions, network namespaces allow individual containers exclusive access to virtual network resources, and each container can be assigned a separate network
18%
Guacamole: Remote Desktop
04.02.2013
Home »  Articles  » 
 
3 and, in the current version 0.6.2, supports VNC and RDP – although with limited functionality in some cases. For example, you cannot transmit audio data or connect network drives over RDP

« Previous 1 ... 13 14 15 16 17 18 19 20 21 22 23 24 25 26 ... 163 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice