Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (978)
  • Article (306)
  • News (84)
  • Blog post (7)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ... 138 Next »

28%
Load testing with Locust
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Damien TUPINIER on Unsplash
). Set the Time to Live (TTL) of your DNS records to a very small value (e.g., in the single-digit minute range) for one to two days and then store an IP address of another server for the duration
28%
Parallel Versions of Familiar Serial Tools
28.08.2013
Home »  HPC  »  Articles  » 
When *nix was born – and for a very long time afterward – systems only had a single core. The advent of “clusters” of nodes started people thinking about how to issue the same command to all nodes
28%
Combining Directories on a Single Mountpoint
19.05.2014
Home »  HPC  »  Articles  » 
In a previous article I talked about SSHFS, a userspace filesystem that allows you to mount a remote filesystem via SFTP over SSH using the FUSE library. It is a very cool concept for a shared
28%
Parallel Shells: Run Commands on Multiple Nodes
02.07.2014
Home »  HPC  »  Articles  » 
and cons. A short list includes: dsh PyDSH ppss PSSH pdsh PuSSH sshpt mqsh A number of these tools are written in Python, which has become a very popular tool for devops
28%
Cloud Forensics
03.02.2012
Home »  Articles  » 
 
very limited, which prevents a complete resolution of the facts of the case. The context in which the evidence exists is another issue. External forensics investigators might not, at first glance
28%
Interview with Gregory Kurtzer, Developer of Singularity
21.04.2016
Home »  HPC  »  Articles  » 
their knowledge for the greater good. Literally thousands of very hard working and extremely intelligent people develop open source software – most of the time for Linux. This is particularly true for HPC
28%
Read-only File Compression with SquashFS
14.06.2017
Home »  HPC  »  Articles  » 
extension indicates that the file has been compressed with gzip . The compression ratio, which is the ratio of the original size to the compressed size, is 11.9:1. This compression ratio is very dependent
28%
Configuring IPv6 in Windows with NetShell
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © James Steidl, 123RF.com
(s), and DNS server. However, IPv6 offers several other features that are not controllable via the standard configuration dialog. Also, the overview you get when you press Details is very rudimentary (Figure 2
28%
Data virtualization using JBoss and Teiid
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © J.R. Bale, 123RF.com
in the area of social media. Access to this type of data involves very different requirements than for locally available data, such as how the data can be transferred in a secure manner. Encryption plays
28%
Improved defense through pen testing
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image Photo by Simeon Jacobson on Unsplash
important for your particular situation. Cybersecurity is very context specific; what works in one organization or situation might not stand up well in another. From Defender's Dilemma to Hacker's Dilemma

« Previous 1 ... 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ... 138 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice