Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %2522Rub%253%25390 Llorente%2222 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (281)
  • Article (119)
  • Blog post (1)
  • News (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 23 24 25 26 27 28 29 30 31 32 33 34 35 36 ... 41 Next »

65%
Fixing Ceph performance problems
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Kritiya Sumpun, 123RF.com
setup is a Ceph cluster with about 2.5PB gross capacity that is mainly used for OpenStack. When you start a virtual machine that uses an RBD image stored in Ceph as a hard drive for the root filesystem
65%
Use Linux Containers with WSL2 on Windows
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by Muneeb Syed on Unsplash
bypthomo0u6ip7h5mlxprneuvzeqy5c6mm5rke5-8dsgejlbdnte9iiqd4kiehkx8 192.168.178.244:2377 docker swarm init --advertise-addr=192.168.178.244 --listen-addr 192.168.178.244:2377 Conclusions Linux ... Deploy a full Linux container environment, including a Kubernetes cluster, on Windows with Windows Subsystem for Linux version 2. ... Containers + WSL2 ... Use Linux Containers with WSL2 on Windows
65%
Go testing frameworks
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Lucy Baldwin, 123RF.com
unparalleled at the time called CPAN [2]. Things have since changed, with Perl's popularity steadily declining in the eyes of developers and other languages rising to produce comparably large module libraries
65%
Manage software apps publicly and privately
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Akurhan, 123RF.com
. Listing 3 YAML Installer File PackageIdentifier: OSC.Ficl PackageVersion: 1.2.0 InstallerLocale: en-US InstallerType: msi ProductCode: '{116A96E1-3C5C-4147-AC63-98427DFE866B}' Installers
65%
Exchange Web Services for Mailbox Access
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Paul Herbert, 123RF.com
will be based on state-of-art authentication with Active Directory Authentication Library (ADAL) and OAuth 2.0 [3]. Getting Started with Exchange Web Services Since Exchange 2007, Microsoft has recommended
65%
Resource Management with Slurm
05.11.2018
Home »  HPC  »  Articles  » 
One way to share HPC systems among several users is to use a software tool called a resource manager. Slurm, probably the most common job scheduler in use today, is open source, scalable, and easy ...    infinite         4/9/3/16  node[212-213,215-218,220-229] This example lists the status, time limit, node information, and node list of the p100 partition. sbatch To submit a batch serial job to Slurm, use the ... One way to share HPC systems among several users is to use a software tool called a resource manager. Slurm, probably the most common job scheduler in use today, is open source, scalable, and easy
65%
An introduction to a special tool for transforming data formats
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Artsem Martysiuk, 123RF.com
!Box ;Mitp ;0240;20 2015;02; Will, Torsten T. ;Einführung in C++ ;Galileo ;0520;25 2015;10; Keller, Müller
65%
Linux nftables packet filter
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © alphaspirit, 123RF.com
add rule inet firewall incoming drop The individual objects and their hierarchy are now displayed by nftables with nft list ruleset (Listing 2). The -a option ensures that the internal enumeration
65%
Exploring the filesystem that knows everything
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
Lucy Baldwin, 123RF
paper [2] entitled "Processes as Files." Cross-pollinated through the later Bell Labs Plan 9 implementation, Linux's version is original in exposing not just process information, but a wealth of system
65%
Trivy security scanner
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Lead Image © MPower, photocase.com
(NIST) National Vulnerability [2] or the Aqua Vulnerability [3] database. Figure 1: An image scan with Trivy generates a long list of vulnerabilities

« Previous 1 ... 23 24 25 26 27 28 29 30 31 32 33 34 35 36 ... 41 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice