Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (488)
  • Article (152)
  • News (34)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 31 32 33 34 35 36 37 38 39 40 41 42 43 44 ... 68 Next »

17%
HDF5 with Python and Fortran
21.03.2017
Home »  HPC  »  Articles  » 
  18      print "dset.shape = ",dset.shape 19  20      print "dset.dtype = ",dset.dtype 21  22      print "dset.name = ",dset.name 23    24      print "f.name = ",f.name 25    26      grp
17%
SSHFS for Shared Storage
15.09.2020
Home »  HPC  »  Articles  » 
need SSH active on both systems. Almost all firewalls are set up to allow port 22 access or have mapped port 22 to a different port that can accommodate SSHFS. All the other ports can be blocked
17%
Userspace secure filesystem
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © mipan, 123RF.com
need SSH active on both systems. Almost all firewalls are set up to allow port 22 access or have mapped port 22 to a different port that can accommodate SSHFS. All the other ports can be blocked
17%
The top three SSH tricks
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Fotoflash,Fotolia.com
-A INPUT -p tcp -s [IP address of allowed server] --dport 22 -j ACCEPT on the server to which you want to SSH. Trick 2: Copying Files Securely The SSH protocol also includes Secure Copy (SCP
17%
Chronicles
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © Maxim Kazmin, 123RF.com
can't be bothered to do what's right, although it's your responsibility to be sure they do. That sounds a lot like a classic catch-22 situation. Although, I never read the book or saw the movie, I
17%
Modularize websites with Web Components
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Andrey Prokhorov, fotolia.com
Script code shown follows the ECMAScript 6 standard, the reference variable this in the lambda functions of lines 18 (Listing 3) and 17 (Listing 5) refers to the current object and not, as in the previous Java
17%
Gatling load-testing tool
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by NoWah Bartscher on Unsplash
as the directory where the output report has been generated. Listing 6 Test Status ================================================================================ 2021-06-20 22
17%
Using Expect scripts to automate tasks
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Kheng Ho Toh, 123RF.com
conservatively originally 21 if {$force_conservative} { 22 set send_slow {1 .1} 23 proc send {ignore arg} { 24 sleep .1 25 exp_send -s -- $arg 26 } 27 } 28
17%
Hybrid public/private cloud
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Photo by JJ Ying on Unsplash
Fn::Base64: 20 Fn::Join: 21 - '' 22 - 23 - "{\n" 24 - '"bucket"' 25 - ' : "' 26 - Ref: S3Bucketname 27
17%
Backup and replicate VMs on VMware ESXi
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © urbanhearts, fotolia.com
the option --backup-vms=VM1,VM2,VM3, which defines which VMs you want XSIBackup to replicate. Additionally, you can define whether the backup solution should overwrite existing files or only add changed data

« Previous 1 ... 31 32 33 34 35 36 37 38 39 40 41 42 43 44 ... 68 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice