Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (747)
  • Article (215)
  • News (38)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 29 30 31 32 33 34 35 36 37 38 39 40 41 42 ... 101 Next »

15%
Windows Server 2012 Administration
07.06.2012
Home »  Articles  » 
 
. In PowerShell versions 1.0 and 2.0, the Where function required the use of curly braces and the odd parameter variable type: $__.variable . Now, the Where cmdlet is smart enough to understand the variable
15%
Maintaining Android in the enterprise
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Iaroslav Neliubov, 123RF.com
* 10 * daemon started successfully * 11 List of devices attached 12 015d8bed0d3c0814 device If you use the commands from the SDK regularly, it makes sense to add its path, preferably like
15%
A self-healing VM system
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © THISSATAN KOTIRAT , 123RF.com
# DHCP Server Configuration file. # see /usr/share/doc/dhcp*/dhcpd.conf.example # see dhcpd.conf(5) man page # subnet 10.14.2.0 netmask 255.255.255.0 { option routers 10
15%
The RADOS Object Store and Ceph Filesystem
24.04.2012
Home »  HPC  »  Articles  » 
= alice mon addr = 10.42.0.101:6789 [mon.b] host = bob mon addr = 10.42.0.102:6789 [mon.c] host = charlie mon addr = 10.42.0.103:6789 [osd.0] host = alice [osd.1] host = bob [osd.2
15%
Security risks from insufficient logging and monitoring
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Photo by Ryoji Iwata on Unsplash
_Top_10-2017_%28en%29.pdf.pdf OWASP Top 10 2017: The Ten Most Critical Web Application Security Risks. Release Candidate 2: https://www.owasp.org/images/b/b0/OWASP_Top_10_2017_RC2_Final.pdf Ponemon
15%
Run Kubernetes in a container with Kind
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © Kirsty Pargeter, Fotolia.com
-Lo ./kind https://kind.sigs.k8s.io/dl/v0.10.0/kind-linux-amd64 $ chmod +x ./kind $ mv ./kind /usr/local/bin/kind $ kind --version kind version 0.10.0 Get an incredibly quick start
15%
System temperature as a dimension  of  performance
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Lead Image © Lucy Baldwin, 123RF.com
of alternative sources. Listing 1 sensors Output federico@ferenginar:~$ sensors k10temp-pci-00c3 Adapter: PCI adapter temp1: +42.5¡C (high = +70.0¡C) (crit = +100.0¡C
15%
Warewulf 4 – Environment Modules
20.03.2023
Home »  HPC  »  Articles  » 
in to the first compute node (Listing 5). Listing 5: Checking Lmod on the Compute Node [laytonjb@warewulf ~]$ ssh n0001 Last login: Sun Feb 12 09:10:32 2023 from 10.0.0.1 [laytonjb@n0001 ~]$ module
15%
gcc
01.08.2012
Home »  HPC  »  Articles  »  Warewulf Cluste...  »  Warewulf 3 Code  » 
 
compilers/gcc/4.4.6 modulefile #%Module1.0##################################################################### ## ## modules compilers/gcc/4.4.6 ## ## modulefiles/compilers/gcc/4.4.6  Written
15%
Tuning I/O Patterns in C
31.07.2013
Home »  HPC  »  Articles  » 
; 22 my_record.z = counter + 2; 23 my_record.value = (float) counter * 10.0; 24 /* write out my_record */ 25 } 26 return 0; 27 } One-by-One Initially, I’m just going

« Previous 1 ... 29 30 31 32 33 34 35 36 37 38 39 40 41 42 ... 101 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice