Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (88)
  • Article (36)
  • News (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 ... 13 Next »

25%
Zuul 3, a modern solution for CI/CD
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © lightwise, 123RF.com
conditions, jobs, and the results of a change. The main pipeline elements are: name – A unique name for the Zuul tenant. manager – The relation to other ongoing changes for a given project (e
25%
Secure Your Server with TCP Wrappers
02.10.2012
Home »  Articles  » 
 
Many years ago I remember somebody mentioning that rather than running a firewall, they were just using TCP Wrappers. This piqued my interest because all my customers talked about when it came
25%
Prolog and Epilog Scripts
07.07.2021
Home »  HPC  »  Articles  » 
should be run on all nodes in the job). The DCGM is then enabled to gather stats on the GPUs in the group (the -e  option) for a specific job ID (the -s  option). Listing 5: Prolog to Gather GPU
25%
Infrastructure as Code with Terraform
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © Sebastian Duda, 123RF.com
_keys = ["${digitalocean_ssh_key.jondoe.id}"] 14 provisioner "remote-exec" { 15 inline = [ 16 "docker run -p 80:80 --name ${var.site_name} -e AUTHOR=\"${var.site_author}\" -d -P ${var
25%
OpenMP – Coding Habits and GPUs
13.06.2019
Home »  HPC  »  Articles  » 
is that you cannot put any statements between the loops (i.e., no code between the i  and j  loops in the example). Reordering or refactoring code to keep the loops next to each other can pay off, especially
24%
An interview with SUSE CEO Nils Brauckmann
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Photos Courtesy of Swapnil Bhartiya
Brauckmann and his team, which included Michael Miller, President of Strategy, Alliances, and Marketing, took the helm of the SUSE brand and product portfolio. Brauckmann kept the company on the right track
24%
Making Kerberoasting uneconomical
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © alphaspirit, 123RF.com
and groups in your environment who actually need it (i.e., only the Tier 0 administrators, if in doubt) have the right to describe the servicePrincipalName attribute; otherwise, an attacker could make
24%
Handy Windows tools for sniffing network traffic
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Barna Tanko, 123RF.com
. Alternatively, you can track the path of a packet to a specific server. Click on Traceroute and specify the IP address or the server name at the top of the window. When you start the process, you will see
24%
News for Admins
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
 
-Wave. D-Wave Advantage systems are "the world's largest annealing quantum computers, with more than 5,000 qubits and 15-way connectivity," the company says. And, with on-premises installation, customers can
24%
Guarding against social engineering attacks
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Photo by Benjamin Sow on Unsplash
'd expect from the name, it's open source and describes itself as being "more than an operating system, it is a Free Open Source Community Project with the aim of promoting the culture of security." Bundled

« Previous 1 2 3 4 5 6 7 8 9 10 ... 13 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice