Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: give seem nan change phone 2 nano(711bmw.com)give seem nan change phone 2 nano(711bmw.com)w8n ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (191)
  • Article (73)
  • News (2)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 20 21 22 23 24 25 26 27

15%
Six storage drivers for Kubernetes
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © webreporter, photocase.com
, the user can define a series of empty PVs that can then be used by a claim. Hostpath Hostpath [2] is the simplest CSI driver for Kubernetes. As the name suggests, this storage class creates subdirectories
15%
Open Virtual Desktop 3.0 as an alternative to VDI
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Oksana Bratanova, 123RF.com
Ulteo was founded by Mandriva inventor Gael Duval in 2007, and its first product was an online version of OpenOffice. People seemed to take a liking to virtualized applications, because just one
14%
Log analysis in high-performance computing
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Kier… in Sight on Unsplash
? What kernel modules are loaded? What, if any, errors occur (and when)? The answers to these questions allow you to recognize when things don't seem quite right with the systems (events) that "normal" log
14%
Preparing for cyberattacks
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
, the goal of ransomware is to extort a ransom. Emotet [1] and EternalBlue [2] are just two of many ways criminals take control of computers and encrypt existing files. The Emotet botnet was dismantled
14%
When are Kubernetes and containers not a sensible solution?
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Kelly Sikkema on Unsplash
Containers, Kubernetes, Rancher, OpenShift, Docker, Podman – if you have not yet worked in depth with containers and Kubernetes (aka K8s), you might sometimes get the impression that you have
14%
Tricking Intruders with HoneypotMe
26.10.2012
Home »  Articles  » 
 
, it seems logical to leverage these unused ports as honeypots on production systems, rather than dedicating resources exclusively for use as honeypots. Risk-Free Pass An evaluation of incoming connections
14%
Getting Data Into and Out of the Cluster
14.08.2023
Home »  HPC  »  Articles  » 
things: (1) I’m glad people are not afraid to ask questions, and (2) everyone starts somewhere. For quite a while, I had not thought of people getting started with Linux and HPC. I have spent quite a bit

« Previous 1 ... 20 21 22 23 24 25 26 27

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice