Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (346)
  • Article (121)
  • News (2)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ... 47 Next »

12%
Log Management
10.10.2022
Home »  HPC  »  Articles  » 
 dmesg  command, which is taken from syslog ) auth.log  (authentication information) boot.log  (boot information) As an example, Table 1 shows some of the logs on my Xubuntu 20.04 system. This isn
12%
Hyper-V containers with Windows Server 2016
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © scyther5, 123RF.com
[1]. New Options in Virtual Networks At the network level, the future Hyper-V comes with some improvements to detail. For example, vNIC Consistent Naming is more of a convenience feature. A virtual
12%
Application Monitoring with openITCOCKPIT
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Author, 123RF.com
later by the service in the openITCOCKPIT server's shell and hands over the appropriate output to the service. To keep things clear-cut and flexible, you should use as many variables (i.e., $USER1
12%
Security first with the Hiawatha web server
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Tatiana Popov, 123RF.com
purposes, you can adjust your local hosts configuration. In Windows, open file C:\Windows\System32\Drivers\Etc\hosts with administrator rights. Add a line like the following: 192.168.0.115 www.thisisagreatwebsite.com
12%
High availability with SQL Server 2012 and 2014
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © li xuejun, 123RF.com
The 2014 version of SQL Server introduces powerful new features, including: In-memory OLTP (code-named Hakaton) for significant performance improvements with frequent table access Improvements
12%
Zero Trust as a security strategy
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Jack Dong on Unsplash
done things this way" contains more than a shred of truth. Anyone who has ever experienced a European IT company from the inside will know what I mean when I say that the impression is more
12%
Red Hat’s Cloud Tools
08.07.2013
Home »  Articles  » 
 
and others with RHEV 3.1, because the Red Hat developers needed to replace proprietary code elements (C#) with open source code over the years. A typical RHEV environment consists of one (or more) hypervisor
12%
How Old is That Data?
20.04.2017
Home »  HPC  »  Articles  » 
. For example, [laytonjb@home4 ~]$ agedu -w Using Linux /proc/net magic authentication URL: http://127.0.0.1:42821/ A screenshot of the web browser output is shown in Figure 1
12%
Red Hat's cloud and virtualization portfolio
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
on Linux hosts running RHEL or Fedora. Red Hat only achieved a concept comparable to VMware and others with RHEV 3.1, because the Red Hat developers needed to replace proprietary code elements (C#) with open
12%
Getting started with OpenStack
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Sascha Burkard, 123RF.com
in the background and have one important element in common: The entire OpenStack source code is written in Python. Figure 1: Although OpenStack comprises many more

« Previous 1 ... 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ... 47 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice