Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1595)
  • Article (348)
  • News (206)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 208 209 210 211 212 213 214 215 216 Next »

18%
Moving Your Data – It’s Not Always Pleasant
08.05.2013
Home »  HPC  »  Articles  » 
that these attributes are not yet implemented. However, dcp might be something to test to see if it meets your needs. You also might contribute something to the project, perhaps adding file attributes. 3. tar Another
17%
Building an HPC Cluster
16.06.2015
Home »  HPC  »  Articles  » 
refer to as the third layer, to really make your HPC cluster sing. Layer 3: Deep Administration The third level of tools gets you deeper into HPC administration and begins to gather more information
17%
Privacy Policy
24.05.2018
Home »  HPC  » 
 
advertising material, such as email spam, is received. 3. Data collection on our website Cookies Some of our web pages use cookies. Cookies do not harm your computer and do not contain any viruses
17%
Privacy Policy
24.05.2018
Home » 
 
if unsolicited advertising material, such as email spam, is received. 3. Data collection on our website Cookies Some of our web pages use cookies. Cookies do not harm your computer and do not contain any
17%
Getting Data Into and Out of the Cluster
14.08.2023
Home »  HPC  »  Articles  » 
storage that uses other protocols, such as Amazon Web Services (AWS) Simple Storage Service (S3) buckets, NFS, Google Drive, Microsoft OneDrive, Backblaze, SFTP and SSHFS, Nextcloud, and others. All
17%
Vulnerability assessment best practices for enterprises
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Photo by Fancycrave on Unsplash
after the scanning process. (3) They are designed to discover known vulnerabilities only. They cannot identify other security threats, such as those related to physical, operational, or procedural issues
17%
Run your own chat server
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Volodymyr Hryshchenko on unsplash
: 0.0.0.0 port: 29318 database: type: sqlite3 uri: whatsapp.db Additionally, you need to configure the permissions setting to match your domain so that only users from your domain
17%
Log analysis in high-performance computing
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Kier… in Sight on Unsplash
hope to orient you in the correct direction for deploying a log analysis capability. Splunk Although I'm a big supporter of open source, Splunk [3], a commercial product, is probably the gold standard
17%
Kafka: Scaling producers and consumers
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Patrick Schneider on Unsplash
.a.k.c.FetchSessionHandler:438 - [Consumer clientId=consumer-1, groupId=jesseyates.kafka.mirror] Error sending fetch request (sessionId=INVALID, epoch=INITIAL) to node 3: org
17%
Nothing works without a profile
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © abidal, 123RF.com
the requirements for environments with folder redirection [3]. Starting Points Basically, UEM tools have two ways to enable backing up and restoring configuration data. With the "external method," the UEM has

« Previous 1 ... 208 209 210 211 212 213 214 215 216 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice