Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (220)
  • Article (11)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 16 17 18 19 20 21 22 23 24 Next »

24%
Automatically install and configure systems
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © maroti, 123RF.com
invention. Three protocols, all primeval rocks of the Internet, collaborate: DHCP provides a server with an IP address so that it can speak TCP/IP and UDP. With TFTP, the system downloads a bootloader
24%
NVMe-oF gears up to replace iSCSI
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Mathew Browne on Unsplash
controllers. On top of that, NVMe has been massively tweaked in recent years. Today's NVMe devices are by far the fastest storage devices. In combination with fast flash chips, they achieve impressive
24%
Container Apps
02.10.2017
Home »  Articles  » 
 
successful attacks from persisting after a container stop/restart is very welcome.When running your snaps, you get to choose between three types of confinement: strict , devmode , and classic.  The first
24%
Data Analysis with R and Python
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © mopic, 123RF.com
the report generator of the sample application displays the comet data in Firefox. The selection list at the top lets the user select a report variant. If you click on Send, JavaScript sends an HTTP request
24%
Vulnerability assessment best practices for enterprises
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Photo by Fancycrave on Unsplash
assets can come from a variety of threats that can be considered possible hazards and usually fall into three categories: man-made (intentional), natural disaster, and accidental (unintentional
23%
SmartOS as a virtualization platform
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Paulus NR, 123RF.com
-known Linux tool top does not exist, SmartOS has a program called prstat. A handy cheat sheet for Linux users listing the appropriate commands in SmartOS is available online [2]. The configuration files
23%
Networking strategies for Linux on Azure
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image ©pakhnyushchyy, 123RF.com
that these workloads perform optimally and securely within the Azure environment (Figure 1). Figure 1: Subnet configuration within an Azure VNet (vnet1). Three subnets
23%
Warewulf 4 – Python and Jupyter Notebooks
13.04.2023
Home »  HPC  »  Articles  » 
description whatis("Description: Anaconda 22.9.0 with Python 3.9.13") whatis("URL: https://www.anaconda.com/products/distribution") -- Take care of $PATH, $LD_LIBRARY_PATH, $MANPATH prepend_path("PATH", path
23%
When I/O workloads don't perform
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © Viacheslav Iakobchuk, 123RF.com
to balance the same I/O across multiple drives (e.g., in a RAID0, 5, or 6 configuration). Also, notice the average CPU metrics at the top of each interval. Here, you will find a breakdown of how much
23%
When I/O Workloads Don’t Perform
12.05.2021
Home »  HPC  »  Articles  » 
at the top of each interval. Here, you will find a breakdown of how much of the collected CPU is busy performing tasks, waiting on completion of tasks (%iowait ), idling, and so on. The less idle in the system

« Previous 1 ... 16 17 18 19 20 21 22 23 24 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice