Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 微扑克全级别俱乐部推荐dv9500.com微扑克全级别俱乐部推荐dv9500.com微扑克全级别俱乐部推荐dv9500.com微扑克全级别俱乐部推荐dv9500.com4 ?

Refine your search
  • [x] Content type: Article (Print)
Sort order
  • Date
  • Score
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 Next »

75%
Setting up Windows clients with Chef
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Sebastian Kaulitzki, 123RF.com
between 64-bit versions for Red Hat Enterprise and Ubuntu. After downloading the 500MB DEB file, install it in the usual way from the Ubuntu Software Center and acknowledge any errors relating
74%
Network monitoring with Icinga and Raspberry Pi
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © AndreaDanti, 123RF.com
need to make a few more purchases. The following list indicates what you will need to complete this project: Raspberry Pi Model B+. 5V, 1A USB power supply. 4GB MicroSD card (minimum); I
74%
Implement your own MIBs with Python
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
-trees directory (.1), mgmt (.2), experimental (.3), and private (.4) reside. In practice, everything of interest is located within these sub-trees. Whereas the first three are characterized by vendor
74%
Using benchmarks to your advantage
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Tom De Spiegelaere, 123RF.com
access and communication. MG – Approximates the solution of a three-dimensional discrete Poisson equation using the V-cycle multigrid method on a sequence of meshes. Exhibits both long- and short
73%
Time-series-based monitoring with Prometheus
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Juthamas Oonhawat, 123RF.com
such as containers. In native cloud environments, Prometheus [3], with its time series database approach, has therefore blossomed into an indispensable tool. The software is related to the Kubernetes [4] container
73%
Interview with the developer of Singularity
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © wu ruiyun, 123RF.com
on the architecture for the next major version of Warewulf (v4). I am also part of a new open source initiative being formed called OpenHPC hosted by the Linux Foundation, where I will be serving on the technical
73%
Open source multipoint VPN with VyOS
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Photo by Damon Lam on Unsplash
. Vyatta quickly became Brocade Vyatta 5400 vRouter and is now available for a price. VyOS Naturally, the Linux community didn't like this strategy, and several projects emerged from the last open source
73%
Application virtualization with Docker
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Oleksiy Mark, 123RF.com
containers (Figure 3) – that is, completely virtualized operating systems – and application containers (Figure 4) for virtualizing a particular application, including its run-time environment. However, LXC
73%
Darshan I/O analysis for Deep Learning frameworks
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Michaela Murphy on Unsplash
, so I can get a feel for the postprocessing output. I grabbed an example from a previous article [4] (Listing 1). Although this example doesn't produce much I/O, I was curious to see whether Darshan
72%
Discovering indicators of compromise
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Jakob Owens on Unsplash
and organizations on which they work. Two of the more popular models include: The Cyber Kill Chain copyrighted by Lockheed Martin [4]. The Mitre ATT&CK model [5]. Just as a good hiker uses different

« Previous 1 2 3 4 5 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice