Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xsede%3 ?

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (315)
  • Article (8)
  • News (8)
Keywords

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 29 30 31 32 ... 34 Next »

18%
Snapshot management for Azure VMs
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © meepiangraphic, 123RF.com
that opens, enter the name for the new data carrier; snapshot is automatically selected as the data carrier type (Figure 3). After creation, the new data carrier is available for access – you can dock it onto
18%
Bare metal lifecycle management with six open source tools
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Beth Macdonald on Unsplash
of a new setup phase in the data center. Foreman can be installed retrospectively, but this is even more time consuming. Tinkerbell: Success with Kubernetes Tinkerbell [3] has made a name for itself
18%
Core Linux Commands for HPC
09.03.2025
Home »  Articles  » 
will be controversial, revolve around networking (Table 3). The idea is to start understanding the basics of networking and a few commands on how to check on various aspects. Table 3: Secondary Networking HPC Linux
18%
Live migration of virtual machines on Hyper-V
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Anna Omelchenko, 123RF.com
, such as an external hard drive, or directly across the network. You can also set up a schedule (Figure 3). Figure 3: Scheduling the replication
18%
Tools for troubleshooting the network
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Photographer, 123RF.com
(Figure 3). In subsequent test runs, you can compare the results with a previously saved map; devices added or removed are listed in each category. Figure 3
18%
Improve the physical security of your business
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© ginasanders, 123RF.com
. Often, pressing the handle doesn't just activate the latch, but it also draws back the bolt on the locked door. In this case, an attacker needs a door handle catch (Figure 3). A piece of wire, bent
18%
Dispatches from the world of IT
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
of approximately $3M per MW of IT. In addition, IT systems that can tolerate higher temperatures can reduce the risk of IT failures during facility cooling outages." Red Hat and SAP Red Hat announced
18%
Convenient graphical remote control
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Thor Jorgen Udvang, 123RF.com
set of important remote control functions. On the bottom right is the connection monitor, which you can also hide and which tells you who is accessing the computer across the wire (Figure 3
18%
Server validation with Goss
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Ewa Walicka, fotolia.com
passes an IPv4 address to the API website and expects the correct geographical assignment: http: geoip-api: status: 200 url: http://geoip.example.net/1.2.3.4 body: - Australia
18%
OpenStack workshop, part 1: Introduction to OpenStack
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
), Glance (images), Nova (cloud controller), Dashboard (web interface; Figures 2 and 3), and Swift (storage), they now include Quantum, which takes care of the network in the cloud, and Cinder, which provides

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 29 30 31 32 ... 34 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice