Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (57)
  • News (13)
  • Article (7)
Keywords

« Previous 1 2 3 4 5 6 7 8 Next »

22%
SC24 – Bursting at the Seams
07.01.2025
Home »  HPC  »  Articles  » 
the conference, uses quite a bit of power. I don’t know how SCinet started, but it demonstrates what it takes to build the most powerful and advanced network anywhere, including power and cooling, monitoring
22%
Supercomputing Conference 2024
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © djem, 123RF.com
the conference, uses quite a bit of power. I don't know how SCinet started, but it demonstrates what it takes to build the most powerful and advanced network anywhere, including power and cooling, monitoring
22%
Core Linux Commands for HPC
09.03.2025
Home »  Articles  » 
as some networking, setting you up for HPC, which will be in a subsequent article. Without further delay, you can see my base list in Table 1. I’ll start with these, but let me explain some of them and why
22%
KubeVirt integration in OpenShift and Rancher
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Photo by Darren Halstead on Unsplash
with many drawbacks. On the one hand, two layers means additional license and subscription costs. On the other hand, both the VM and container layers virtualize resources such as networks and storage, which
22%
Setting up secure RDP connections
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © asphoto777, 123RF.com
a virtual private network (VPN). RDP files can be digitally signed and protected with certificates, which enhances security while avoiding error messages popping up because of incorrect signing. All
21%
Code IaC for provisioning of preconfigured virtual environments
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © vladnikon, 123RF.com
, and streamlined operations. With seamless integration into Azure services and hybrid cloud connectivity to enterprise networks, Microsoft Dev Box is a good choice for organizations looking to improve collaboration
21%
El Capitan Heads the Latest TOP500 Supercomputer List
02.12.2024
Home »  News  » 
 
,039,616 combined CPU and GPU cores and is based on AMD 4th generation EPYC processors and AMD Instinct MI300A accelerators. It uses the Cray Slingshot 11 network for data transfer. El Capitan also achieved an energy
21%
Integrate remote cloud storage
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © rawintanpin, 123RF.com
Often, users fail to back up their data regularly and synchronize backups. Of course, any data you store locally should also be stored on a remote mass storage device. If the local server or network
21%
TUI Tools for Containers
07.10.2024
Home »  HPC  »  Articles  » 
can see other metrics such as memory, disk, and network utilization, along with an enhanced process table that includes memory and CPU usage. Notice that the network information at lower left has
21%
ASM tools and strategies for threat management
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © tarokichi, 123RF.com
." Prevention and NIS2 Dennis-Kenji Kipker, Professor of IT Security Law at the Bremen University of Applied Sciences, points out that NIS2 [the successor to the 2016 European Network and Information Systems

« Previous 1 2 3 4 5 6 7 8 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice