Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %200mb%2222%A9n Llorente"523 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (271)
  • Article (135)
  • News (3)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 16 17 18 19 20 21 22 23 24 25 26 27 28 29 ... 42 Next »

47%
Secrets and certificate management
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © phive2015, 123rf.com
_time n/a destroyed false version 1 That output looks promising; Vault has responded as expected. If that doesn't work correctly for you for some reason, then you've probably not exported
47%
Graph database Neo4j discovers fake reviews on Amazon
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Image by Gerd Altmann from Pixabay
with the official API or a scraper. Listing 1 reviews.yaml reviews: product1: - reviewer1 - reviewer2 - reviewer3 - reviewer7 product2: - reviewer1 - reviewer2
47%
New versions of the Endian and Sophos UTM solutions
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Dmitriy Cherevko, 123RF.com
 –  – UTM 220  – FullGuard Bundle  – US$ 2,870 Endian 3.0 Endian released the new version of its firewall in January. The version jump from 2.5.2 to 3.0 already shows
47%
Maintaining Android in the enterprise
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Iaroslav Neliubov, 123RF.com
x41 23 CPU architecture: 7 24 CPU variant : 0x2 25 CPU part : 0xc09 26 CPU revision : 9 27 Hardware : grouper 28 Revision : 0000 29 Serial : 0f410a0001440200
47%
Real World AWS for Everyone
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Photo by adrian on Unsplash
]. Create access key pairs for the required tenants/users. An AWS access key always has a key ID in the form of AKIAJ4 PMEXHFYUHIXG2A and a secret access key such as :/ONT0HapjmLw7xni 6FPscmvPZJ Sc75hUXAQI+N3
47%
Service mesh for Kubernetes microservices
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image by Ricardo Gomez Angel on Unsplash.com
functions for the application using the mesh. These typically include: Traffic management – routing user requests to services according to criteria such as user identity, request URL, weightings (for A
47%
What's your status (page)?
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © Tatiana Venkova, 123RF.com
://github.com/monitoror/monitoror Code for this article: https://linuxnewmedia.thegood.cloud/s/9nFQcFb2p8oRMEJ Vigil: https://github.com/valeriansaliou/vigil Vigil sample config file: https
47%
Monitoring Storage with iostat
25.02.2013
Home »  HPC  »  Articles  » 
.00 0.00 01/31/2013 09:56:03 AM avg-cpu: %user %nice %system %iowait %steal %idle 6.00 0.00 2.00 0.50 0.00 91.50 Device: rrqm/s wrqm/s r/s w/s rMB
47%
Look for Bottlenecks with Open|SpeedShop
21.12.2011
Home »  HPC  »  Articles  » 
module load openspeedshop-2.0.1 module load mvapich-1.1  (or other MPI implementation). If you run your application like this normally, mpirun –np 256 smg2000 –n 65 65 65  or this, srun -ppbatch -N 32
47%
Collecting and evaluating performance data over a period of time
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Sergey Nivens, 123RF.com
(hercules) 03.12.2013 _x86_64_ (2 CPU) 09:46:03 runq-sz plist-sz ldavg-1 ldavg-5 ldavg-15 blocked 09:46:13 1 468 0.02 0.06 0.14 0 9

« Previous 1 ... 16 17 18 19 20 21 22 23 24 25 26 27 28 29 ... 42 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice