Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %220mb 12 08 Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (343)
  • Article (81)
  • News (5)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 23 24 25 26 27 28 29 30 31 32 33 34 35 36 ... 43 Next »

10%
How graph databases work
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © iofoto, Fotolia.com
[vertices:6 edges:6] 03 04 gremlin> g = graph.traversal() 05 ==>graphtraversalsource[tinkergraph[vertices:6 edges:6], standard] 06 07 gremlin> g.V().label().groupCount() 08 ==>[software:2,person:4] 09 10
10%
Building sustainably safe containers
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © it studiom1, 123RF.com
dockerrepo.matrix.dev/gentoo-glibc:latest-amd64 && touch pushtime Sending build context to Docker daemon 21.12MB Step 1/2 : FROM dockerrepo.matrix.dev/gentoo-base:latest ---> 22fe37b24ebe Step 2/2 : ADD
10%
High-availability workshop: GFS with DRBD and Pacemaker
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Maxim Borovkov, 123RF.com
_gfs_always_with_dlm inf: cl_controld_gfs cl_controld_dlm 07 order o_gfs_always_after_dlm inf: cl_controld_dlm cl_controld_gfs 08 order o_dlm_always_after_drbd inf: ms_drbd_gfs:promote cl_controld_dlm The entries here
10%
Environment Modules
23.02.2012
Home »  HPC  »  Articles  » 
------------------------------------------- /opt/apps/intel11_1/modulefiles ------------------------------------------- fftw3/3.2.2 gotoblas2/1.08 hdf5/1.8.4 mkl/10.2.4.032 mvapich2/1.4 netcdf/4.0.1 openmpi/1
10%
Retrieving Windows performance data in PowerShell
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © andresr, fotolia.com
"..................................................." 05 Add-Content $logfile -value "New log file $(Get-Date)" 06 $c = Get-Credential 07 ##A loop that is run for each server foreach ($server in $serverList) 08 { 09 ##check whether the server answer
10%
Command-line tools for the HPC administrator
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Vasyl Nesterov, 123RF.com
on the storage node; you just need SSH active on your system. Almost all firewalls allow port 22 access, so you don't have to configure anything extra (e.g., NFS or CIFS); you just need one open port
10%
Small-board computers
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © Author, 123RF.com
], to robotics [10], to underwater ROVs [11], and yes, even clusters [12]. The appeal of the Rasp Pi is that it is cheap, uses almost no power, is easy to program, and is really small. Wonderful World of SBCs
10%
Automate CentOS and RHEL installation with PXE
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Michael Kempf, Fotolia.com
_servers: - 10.42.0.10 - 10.42.0.11 dhcp_pxeboot_server: 10.42.0.12 The subnet must be a subrange of the subnet where the VM with the infrastructure services itself is located. However, when
10%
Moving HPC to the cloud
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Zarko Cvijovic, 123RF.com
of options, including dual four-core Xeon, dual six-core Xeon, or quad 12-core AMD processors ranging in speed from 2.2 to 2.9GHz with 24 to 128GB of RAM per server and up to 1TB of scratch local storage per
10%
Endlessh and tc tarpits slow down attackers
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Yewkeo, 123RF.com
. As surely as night follows day, automated attacks will target the default Secure Shell port (TCP port 22), so I will use SSH as the guinea pig test case with the knowledge that I can move the real SSH service

« Previous 1 ... 23 24 25 26 27 28 29 30 31 32 33 34 35 36 ... 43 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice