Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (303)
  • Article (58)
  • Blog post (2)
  • News (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 29 30 31 32 ... 37 Next »

33%
Innovations in PowerShell 5
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Zarko Cvijovic, 123RF.com
, with each new PowerShell version comes a design highlight. In the current PowerShell on Windows  8.1 and Server  2012  R2, this was the "Desired State Configuration" (DSC), which was designed to make other
32%
Getting started with the OpenStack cloud computing framework
28.06.2011
Home »  CloudAge  »  Articles  » 
 
for Clouds Goes Open Source: http://bits.blogs.nytimes.com/2010/07/20/therrecipefforccloudsggoesoopenssource/ As Cloud Platforms Battle For Credibility, OpenStack Is Pretty Solid: http://blogs.forrester.com
32%
Processing streaming events with Apache Kafka
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Photo by Mark Decile on Unsplash
payment = new Payment(orderId,**1000.00d); 07 final ProducerRecord record = 08 new ProducerRecord("transactions", 09 payment
32%
News for Admins
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
 
-clash-protection. No patches have been released by Red Hat or Canonical to fix these vulnerabilities. Source: https://www.qualys.com/2019/01/09/system-down/system-down.txt SQLite Database Vulnerable The Tencent Blade
32%
Writing SELinux modules
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Amy Walters, 123RF.com
A type enforcement (.te) file stores the actual ruleset. To a large extent, it consists of m4 macros, or interfaces. For example, if you want to access a particular service's resources
32%
Migration from LDAP to FreeIPA
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
pier paolo gentili, 123RF
of using the Kerberos client tools will know what I'm talking about. In a previous article [1], I mentioned the open source FreeIPA project [2], which has set itself the goal of being an easy to configure
32%
Ubuntu Business Desktop Remix 12.04 LTS
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
 
/business/advantage Ubuntu Landscape: http://www.ubuntu.com/business/landscape "Red Hat Satellite Server" by James Dade, ADMIN , Issue 09, pg. 60 Business Desktop Remix objectives: http://blog.canonical.com/2012
32%
News for Admins
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
 
, energy-efficient ARM processors continue to challenge the HPC space. See the full announcement at the AMD website (https://www.amd.com/en/press-releases/2021-09-29-amd
32%
The Lua Scripting Language
28.01.2014
Home »  HPC  »  Articles  » 
The Lua scripting language celebrates its 20th birthday this year. Because it is used more often as an embedded scripting language than as an independent programming language (e.g., Python or Perl
32%
Resource Management with Slurm
05.11.2018
Home »  HPC  »  Articles  » 
 NODES (PARTITIONS) 59 GresTypes=gpu 60 DefMemPerNode=64000 61 NodeName=linux1 Gres=gpu:8 CPUs=80 Sockets=2 CoresPerSocket=20 ThreadsPerCore=2 \ RealMemory=515896 State=UNKNOWN 62 PartitionName=debug

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 29 30 31 32 ... 37 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice