Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (735)
  • Article (234)
  • Blog post (6)
  • News (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 29 30 31 32 ... 98 Next »

9%
AMD’s Greg Stoner on ROCm
31.10.2017
Home »  HPC  »  Articles  » 
, and you’re ready to go. I’ve been working with Linux for a long time. I ran a sysop team before I came to AMD. I used to run big clusters and storage arrays. We were all CentOS-based back then. I brought
9%
Linux Storage Stack
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © arsgera, 123RF.com
requests from "starvation." For this purpose, it takes note of an expiration time for each request and pushes it into respective read and write queues sorted by time (deadline queues). The Deadline scheduler
9%
Monitoring Cloud Service Charges
17.08.2011
Home »  CloudAge  »  Blogs  »  Dan Frost's Blog  » 
 
Meter’s running - How to avoid spending all your money— Ever been in a cab, stuck in traffic watching the meter run. You watch each 50-cent increment nudge the fair up dollar by dollar, wondering
9%
Linux Local and Network Filesystems
07.01.2024
Home »  HPC  »  Articles  » 
filesystem so users can access it. Listing Mount Options When I first get on a new system, I like to poke around the filesystem to better understand what’s going on. I do this as a user, and of course I don
9%
Secure Your Server with TCP Wrappers
02.10.2012
Home »  Articles  » 
 
TCP Wrappers are versatile, sophisticated, and surprisingly easy to use, and they can secure your servers from attack with run-time ACL reconfiguration. ... \n\ Host\: %c\n\ Date\: $(date)\n\ " | /usr/bin/mail -s "Connection to %d blocked" chrisbinnie@email.com) & Each time a running service port is probed, you can do far more than just logging ... TCP Wrappers are versatile, sophisticated, and surprisingly easy to use, and they can secure your servers from attack with run-time ACL reconfiguration.
9%
Software instead of appliances: load balancers compared
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Patrick Fore on Unsplash
the commercial version of HAProxy: In addition to support, it comes with a few plugins for additional functions, such as a single sign-on (SSO) module and a real-time dashboard in which various HAProxy metrics can
9%
Cooperation with Cyn.in
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Jo Coenen - Studio Dries 2.6 on Unsplash
, it's time to open the wizard in the browser for web-based configuration by typing http://:8004 . The secured URL (https ) is available on port 8003. The configuration
9%
Getting started with OpenStack
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Sascha Burkard, 123RF.com
-Packard. Horizon: Visualize When it comes to the last component on the list, whether Horizon is needed for an OpenStack installation or not is a moot point. After all, each OpenStack service comes with its own API
9%
Setting up and using Azure Active Directory
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Kheng Ho Toh, 123RF.com
browser below https://portal.office.com and using a synchronized user account. After entering the user's UPN, the Office 365 login page will redirect the browser to ADFS. There, the user
9%
Troubleshooting and maintenance in Ceph
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © KrishnaKumar Sivaraman, 123RF.com
talked about CephX Ceph encryption and how a Ceph cluster could be used as a replacement for classic block storage in virtual environments [3]. Now, it's time to talk about what to do when things go wrong

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 29 30 31 32 ... 98 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice