Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcode%3 08 Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (474)
  • Article (136)
  • News (9)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 33 34 35 36 37 38 39 40 41 42 43 44 45 46 ... 63 Next »

13%
Desired State Configuration for Linux
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © SORAPONG CHAIPANYA, 123RF.com
and target computer. A component specially developed for Linux needs to be provisioned on the Windows system to meet the same conditions. As you might expect, this component is a PowerShell module [3
13%
News for Admins
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
 
-performance computing, known as quantum-centric supercomputing." "In a quantum-centric supercomputing architecture," the announcement states (https://newsroom.ibm.com/2025-08-26-ibm-and
13%
Throw Down the Gauntlet
14.08.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
© bluebay, 123RF.com
 rejected all cipher suites.    * TLSV1_3 Cipher Suites:       Server rejected all cipher suites.    * Resumption Support:       With Session IDs:                  OK - Supported (5 successful, 0 failed, 0 errors, 5 total
13%
Guacamole: Remote Desktop
04.02.2013
Home »  Articles  » 
 
3 and, in the current version 0.6.2, supports VNC and RDP – although with limited functionality in some cases. For example, you cannot transmit audio data or connect network drives over RDP
13%
Citrix XenServer 6.2 goes open source
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © George Tsartsianidis, 123RF.com
is benefiting from it. It took only a week until the first proposal [2] arrived, suggesting how to use this new freedom to bind XenServer to existing Ceph storage [3]. However, setups do not use normal Citrix Xen
13%
Sharing Data with SSHFS
23.04.2014
Home »  HPC  »  Articles  » 
on your system. Almost all firewalls allow port 22 access, so you don’t have to configure anything extra, such as NFS or CIFS. You just need one open port on the firewall – port 22. All the other ports can
13%
A Password Protection Service
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © bluebay, 123RF.com
such as SSH, FTP, IMAP, POP3, Sendmail, and others are susceptible to brute force and dictionary attacks, because username/password combinations are inherently weak protections. Fail2ban allows you to set up
13%
Why Good Applications Don’t Scale
13.10.2020
Home »  HPC  »  Articles  » 
the asymptote is the inverse of the serial portion of the code, which controls the scalability of the application . In this example, p = 0.8 and (1 – p ) = 0.2, so the asymptotic value is a = 5. Further
13%
Run rootless Podman containers as  systemd services
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Photo by Geeky Shots on Unsplash
container images, and podman pull nginx:alpine downloads the nginx:alpine image from one of the registered container repositories. A Podman Compose [3] solution also processes docker-compose.yml files
13%
Tuning I/O Patterns in C
31.07.2013
Home »  HPC  »  Articles  » 
Code Example 1 #include 2 3 /* Our structure */ 4 struct rec 5 { 6 int x,y,z; 7 float value; 8 }; 9 10 int main() 11 { 12 int counter; 13 struct rec my

« Previous 1 ... 33 34 35 36 37 38 39 40 41 42 43 44 45 46 ... 63 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice