Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (821)
  • Article (155)
  • News (98)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 28 29 30 31 32 33 34 35 36 37 38 39 40 41 ... 108 Next »

12%
Getting Started with HPC Clusters
05.06.2013
Home »  HPC  »  Articles  » 
(and that’s the subject of another article). If you want to extend your programming to larger systems, you will need something larger than your desktop or laptop computer. Later, I will present some
12%
Getting Data Into and Out of the Cluster
14.08.2023
Home »  HPC  »  Articles  » 
a local Linux laptop or desktop and either local data that you want to transfer to the cluster or data that is on the cluster that you want to copy to your machine. By “local” I mean something in your
12%
Tricking Intruders with HoneypotMe
26.10.2012
Home »  Articles  » 
 
is not sufficient to ensure reliable detection of all current malware. New Methods To detect the propagation of this kind of malware on monitored networks, other detection methods, such as honeypots, are required
12%
The Azure Arc multicloud and on-premises management platform
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Chris Leipelt on Unsplash
One benefit of using Azure Management Services is that servers managed with Azure Arc are displayed as objects on the Azure portal. These servers can therefore be inventoried, updated, and monitored
12%
Effective honeypots with sensors on production systems
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© monophoto, 123RF.com
-based approach alone is not sufficient to ensure reliable detection of all current malware. New Methods To detect the propagation of this kind of malware on monitored networks, other detection methods
12%
Linux I/O Schedulers
21.03.2018
Home »  HPC  »  Articles  » 
The Linux kernel is a very complex piece of software used on a variety of computers, including embedded devices that need real-time performance, hand-held devices, laptops, desktops, servers
12%
News for Admins
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
 
a Backdoor F-Secure researchers have found a way to exploit the security flaw in AMT that allows a local attacker to backdoor almost any corporate laptop in a matter of seconds, even if the BIOS password, TPM
12%
Phased Updates for Ubuntu 13.04
20.08.2013
Home »  News  » 
 
the user base and monitor the behavior of each update, so changes that cause problems can be suspended or reversed before they affect the entire user base. According to the new plan, which was announced
12%
OpenStack Serves Up Havana
29.10.2013
Home »  News  » 
 
the cloud environment through the OpenStack dashboard. The new OpenStack Metering feature provides a single source for monitoring usage data across OpenStack services. According to the OpenStack project
12%
StackIQ Updates Rocks+
23.02.2012
Home »  HPC  »  News  » 
 
the Linux operating system (Red Hat Enterprise Linux 6, CentOS 6, Oracle Linux 6), cluster management middleware, libraries, compilers, and monitoring tools. It features all the necessary software

« Previous 1 ... 28 29 30 31 32 33 34 35 36 37 38 39 40 41 ... 108 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice