Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (144)
  • Article (139)
  • News (31)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 29 30 31 32 Next »

9%
Data center management with Ralph
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © ffzhang, 123RF.com
the menubar. Ralph provides full data center and back-office support, including printers, laptops, desktop computers, and cell phones. IT asset management dashboards visualize the acquired data in real time
9%
A closer look at hard drives
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Lucy Baldwin, 123RF
where I left off, I'll try find out everything that my laptop knows about its internal drive (Figure 1). Figure 1: Intel SA2M080G2GC, an Intel 320 second
9%
Smartphone management with Microsoft products
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Javier Brosch, 123RF.com
Intune lets admins centrally monitor not only computers and laptops, but also smartphones and tablets (Figure 1). In particular, businesses who rely on Windows Server 2012, Windows 8 and Windows Phone 8
9%
Hardening SSH authentication to the max
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © shutter999, 123RF.com
modules (HSMs) on Android devices, or Trusted Platform Modules on a laptop. The term "discoverable credential" is so called, because the client can determine a list of possible keys in the authenticator
9%
A Brief History of Supercomputers
21.01.2021
Home »  HPC  »  Articles  » 
MHz, eight-wide vector; air-cooled, up to 64 processors; liquid-cooled, 4,096 processors; 1,024 SMP nodes in 2D Torus; code with Python virtual machine (PVM) and message passing interface (MPI
9%
Monitoring Storage with iostat
25.02.2013
Home »  HPC  »  Articles  » 
If you are a system administrator of many systems, or even of just a desktop or laptop, you are likely monitoring your system in some fashion. This is particularly true in high-performance computing
9%
Safe Files
16.04.2015
Home »  HPC  »  Articles  » 
on its laptops that allows the software to steal web traffic using man-in-the-middle attacks. When you use an encrypted filesystem or SEDs, all of the data is encrypted. However, if you forget
9%
Let the Editor Wars Begin!
25.08.2016
Home »  HPC  »  Articles  » 
Code folding Figure 6 shows Editra running on a Windows 10 laptop (testing the multiplatform capability). Figure 6: Editra 0.7.20 on Windows 10
9%
Warewulf 4 – Python and Jupyter Notebooks
13.04.2023
Home »  HPC  »  Articles  » 
. In this section, I show you how, with a little SSH tunneling and a little scripting. The scenario has a user that is using a Linux laptop or desktop (hereafter, computer) away from the cluster, but they can SSH
9%
Linux Local and Network Filesystems
07.01.2024
Home »  HPC  »  Articles  » 
: Ubuntu mount  Output for nfs $ mount -l | grep -i nfs nfsd on /proc/fs/nfsd type nfsd (rw,relatime) 192.168.4.100:/home/laytonjb/work_laptop_dir on /mnt/work_laptop_dir type nfs4 (\   rw,relatime,vers=4

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 29 30 31 32 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice