Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (339)
  • Article (117)
  • News (5)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 18 19 20 21 22 23 24 25 26 27 28 29 30 31 ... 47 Next »

24%
Correctly integrating containers
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Beboy, Fotolia.com
network; the nodes typically use parts of a private network from the 10/8 class A network [8]. Flannel creates a class C network on each node and connects it internally with Docker bridge docker0 via
24%
Puppet Bolt orchestration tool
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by lee junda on Unsplash
docker-compose.yaml version: '3' services: target1: build: . ports: - '3000:80' - '2000:22' container_name: target1 target2: build
24%
Parallel Programming with OpenCL
04.11.2011
Home »  HPC  »  Articles  » 
with AMD, IBM, and NVidia) submitted a specification to the Khronos Group, which promotes the OpenGL specification. Open Computing Language 1.0 (OpenCL) was released late in 2008 [3]. OpenCL now provides
24%
Exploring Ubuntu cloud tools
28.06.2011
Home »  CloudAge  »  Articles  » 
 
- 4B760828 emi- E0A3107A 192.168.1.101 172.19.1.3 pending mykeypair 0 m1.small 2011- 03- 09T16:22:36.864Z cluster1 eki- F7111106 eri- 0B641162 04
24%
Protect privileged accounts in AD
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Lead Image © ginasanders, 123RF.com
to an appropriate value (600 minutes is the AD default; 240 minutes is the default for Protected Users). In the Computer section, create the Access Control Conditions User – Authentication Silo – equals
24%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bluebay, 123rf.com
://nmap.org ) at 2021-07-25 22:05 CEST Nmap scan report for metasploitable (192.168.122.236) Host is up (0.095s latency). Not shown: 65506 closed ports PORT STATE SERVICE 21/tcp open ftp 22/tcp open ssh 23
24%
SPDY HTTP Protocol
08.06.2012
Home »  Articles  » 
 
, “Hypertext Transfer Protocol,” which was finally standardized as HTTP 1.0 in May 1996. Just three years later, HTTP 1.1 was standardized to reflect the increasing load on the web. The revised protocol reduced
24%
OpenLDAP Workshop
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © tiero, 123RF.com
=manager,dc=acme-services,dc=org 21 22 dn: olcDatabase={1}monitor,cn=config 23 changetype: modify 24 replace: olcAccess 25 olcAccess: {0}to * by dn.base="gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth" read by dn
24%
The Cloud’s Role in HPC
05.04.2013
Home »  HPC  »  Articles  » 
, and they won’t be pushing the performance of the systems; however the data center will need a number of systems for the class. If they need 20 cores per student, that’s 600 cores just for this single course
24%
Modern Fortran for today and tomorrow
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © homestudio, 123RF.com
* r 16 item%area = pi * r **2 17 item%circumference = 2.0 * pi * r 18 end subroutine 19 20 end module circle_constant 21 22 program circle_comp 23 ! make the content of module

« Previous 1 ... 18 19 20 21 22 23 24 25 26 27 28 29 30 31 ... 47 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice