Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (241)
  • Article (11)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 18 19 20 21 22 23 24 25 26 Next »

24%
Container Apps
02.10.2017
Home »  Articles  » 
 
successful attacks from persisting after a container stop/restart is very welcome.When running your snaps, you get to choose between three types of confinement: strict , devmode , and classic.  The first
24%
Data Analysis with R and Python
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © mopic, 123RF.com
the report generator of the sample application displays the comet data in Firefox. The selection list at the top lets the user select a report variant. If you click on Send, JavaScript sends an HTTP request
24%
Vulnerability assessment best practices for enterprises
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Photo by Fancycrave on Unsplash
assets can come from a variety of threats that can be considered possible hazards and usually fall into three categories: man-made (intentional), natural disaster, and accidental (unintentional
24%
Comparing 5 to 50TB NAS storage boxes
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Franck Boston, fotolia.com
. RAID Basics In 1988, three researchers from the University of California (David A. Patterson, Garth Gibson, and Randy H. Katz) developed an alternative approach to the problem of storing data
24%
OpenStack workshop, part 1: Introduction to OpenStack
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
. Figure 1: All OpenStack development relies on Canonical's Launchpad; thus, close interaction with Ubuntu was assured from the outset. One, Two, Three … Some observers found the whole thing rather
24%
SmartOS as a virtualization platform
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Paulus NR, 123RF.com
-known Linux tool top does not exist, SmartOS has a program called prstat. A handy cheat sheet for Linux users listing the appropriate commands in SmartOS is available online [2]. The configuration files
24%
Networking strategies for Linux on Azure
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image ©pakhnyushchyy, 123RF.com
that these workloads perform optimally and securely within the Azure environment (Figure 1). Figure 1: Subnet configuration within an Azure VNet (vnet1). Three subnets
24%
Warewulf 4 – Python and Jupyter Notebooks
13.04.2023
Home »  HPC  »  Articles  » 
description whatis("Description: Anaconda 22.9.0 with Python 3.9.13") whatis("URL: https://www.anaconda.com/products/distribution") -- Take care of $PATH, $LD_LIBRARY_PATH, $MANPATH prepend_path("PATH", path
24%
When I/O workloads don't perform
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © Viacheslav Iakobchuk, 123RF.com
to balance the same I/O across multiple drives (e.g., in a RAID0, 5, or 6 configuration). Also, notice the average CPU metrics at the top of each interval. Here, you will find a breakdown of how much
24%
When I/O Workloads Don’t Perform
12.05.2021
Home »  HPC  »  Articles  » 
at the top of each interval. Here, you will find a breakdown of how much of the collected CPU is busy performing tasks, waiting on completion of tasks (%iowait ), idling, and so on. The less idle in the system

« Previous 1 ... 18 19 20 21 22 23 24 25 26 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice