Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last three months
Sort order
  • Date
  • Score
Content type
  • Article (Print) (75)
Keywords

« Previous 1 2 3 4 5 6 7 8 Next »

9%
Creating RAID systems with Raider
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
©Slawomir Kruz, 123RF.com
work to a whole series of individual scripts. Calling raider --help displays the available parameters. The raider -d command provides an overview of the built-in hard drives and partitions
9%
Beyond monitoring: Mathematical load simulation in Perl
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© kudryashka, 123RF.com
as that under the monitored data curve over the same 24-hour period. An analogous relationship also holds if the waiting is excluded from the residence time (R ) in Equation (2) to get Equation (3
9%
Introduction to LVM
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Dvarg, 123RF.com
status of a volume of data. Infos LVM how-to: http://www.tldp.org/HOWTO/LVM-HOWTO LVM mailing list: http://www.redhat.com/mailman/listinfo/linux-lvm ... 7
9%
Debugging the Linux kernel with the Qemu emulator
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Daniela Mangiuca, 123RF.com
:add-symbol-file module.ko text_address -s .data data_address -s .bss bss_address 9. Debug: Set breakpoints and so on. In Toolchain , enable the Build gdb for the Host option; in Kernel | Kernel version , type 3 ... 7
9%
Advanced security in Windows Firewall
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Andrius Repsys, 123RF.com
rules 3. Authenticated work-around rules 4. Block rules 5. Allow rules 6. Default rules The Windows Firewall follows an approach that is different from other firewalls that process rules
9%
Internal central repositories for PowerShell modules
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Kenny Eliason on Unsplash
in Docker (Compose) is also possible. To do so, you need to save the following content in the docker-compose.yaml file: services: nexus: image: sonatype/nexus3 volumes: - "nexus-data:/nexus-data" ports
9%
Professional backup solutions compared
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Kamil Macniak, 123RF
, deduplication reduces the sheer volume of data by identifying identical blocks of data and backing them up once only; all other instances of the same data block are simply referenced by pointers. Depending
9%
How Kanban helps improve IT processes
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© NYUL, 123RF.com
: What is my next job, and when can I start working on it? The answer usually comes from outside the team, which dampens job satisfaction and prevents the Ops team from utilizing its resources optimally
9%
Storage system with OpenSolaris and Comstar
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Aleksandr Fomenkov, 123RF.com
: mypool 12 state: ONLINE 13 scrub: none requested 14 config: 15 NAME STATE READ WRITE CKSUM 16 mypool ONLINE 0 0 0 17 c8t1d0 ONLINE 0 0 0 18 errors: No known data errors On top of this, you can expect
9%
Galera Cluster for MySQL
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Noel Powell, fotolia.com
.g., inconsistent snapshots on the master, or setting the wrong binary log position after insertion), this could quickly cause data inconsistencies between the master and slave. In the old, so-called statement

« Previous 1 2 3 4 5 6 7 8 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice