Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 谷歌seo外推【电报e100】google seo代发.run ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1520)
  • Article (349)
  • News (274)
  • Blog post (10)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 191 192 193 194 195 196 197 198 199 200 201 202 203 204 ... 216 Next »

42%
Three full-text desktop search engines
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by Lucas Gallone on Unsplash
and associated files with you (for example, on a mobile data carrier) and run the program on that device. In the same way, DocFetcher and the indexed documents can be transferred from one computer to another
42%
Network access control with Cisco's Identity Services Engine
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Keith Hardy on Unsplash
(ADE-OS). The current version 3.1 is a Red Hat Enterprise Linux version 8.2. Full root access is reserved for the manufacturer's Technical Assist Center. Some services are run as microservices in Docker
42%
ASM tools and strategies for threat management
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © tarokichi, 123RF.com
of vulnerabilities, so they can be analyzed and continuously monitored. Gartner [3] includes Armis, Axonius, Balbix, JupiterOne, Lansweeper, OctoXLabs, runZero, and ThreatAware in its list of CAASM providers
42%
Setting up your own NAS with FreeNAS 8.0.2
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Vitalii Gulenok, 123RF.com
. Additionally, the server should have at least 4GB of RAM for the latest version to run FreeNAS as an iSCSI target for a Hyper-V cluster or Exchange. Although you can use less memory, you will then want to use
42%
Clustering with OpenAIS and Corosync
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
brunoilfo, 123RF.com
response to a fencing event from the fencing daemon), the resource manager for the HA service that might be running on this node can't be launched on any other node. It is conceivable that the computer has
42%
A simple approach to the OCFS2 cluster filesystem
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Kheng Ho Toh, 123RF.com
is running, the administrator can create the cluster filesystem. In the simplest case, you can use mkfs.ocfs2 devicefile (Listing 3) to do this. The man page for mkfs.ocfs provides a full list of options
42%
Installing and managing thedistributed GlusterFS filesystem
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Tetiana Pustovoitova, 123RF.com
to turn to the servers that will be providing the storage capacity. If you are running these servers on a recent CentOS 6.2, you can download the matching GlusterFS packages off the Internet [3]. You need
42%
Comparing Ceph and GlusterFS
21.04.2015
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © agencyby, 123RF.com
again run out of space. This promise is, however, almost the only similarity between the two projects, because underneath, both solutions go about their business completely differently and achieve
42%
Speed up your MySQL database
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Mikhail Dudarev, 123RF.com
from the perspective of the guest system. You only notice that your own processes are somehow slowing down. Another phenomenon is guest systems running more slowly with more virtual cores than with fewer
42%
S3QL filesystem for cloud backups
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © stylephotographs, 123RF.com
configure some storage, and start running. After that, the data is copied back to permanent storage (perhaps local). However, this is not the only way to utilize cloud resources. In this article, I'll focus

« Previous 1 ... 191 192 193 194 195 196 197 198 199 200 201 202 203 204 ... 216 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice