Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (377)
  • Article (122)
  • News (23)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 34 35 36 37 38 39 40 41 42 43 44 45 46 47 ... 53 Next »

28%
The best cmdlets for PowerShell
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Rossella Apostoli, 123RF.com
-BRANCH1 -Cost 100 -ReplicationFrequencyInMinutes 15 This call sets the metric to 100 and the replication interval to 15 minutes. Testing Replication in PowerShell To discover the replication status, you
28%
Apache Storm
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Sergei Tryapitsyn, 123RF.com
components. The easiest way to obtain them is via the Apt package management system: sudo apt-get update sudo apt-get --yes install openjdk-6-jdk To start, the simplest way is set up a single-node pseudo
28%
Energy efficiency in the data center
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Ussama Azam on Unsplash
supplied to the devices – is a common method for calculating the cost of an infrastructure. With a theoretical PUE value of 1.0, the components would receive 100 percent of the energy used in the data center
28%
Segmenting networks with VLANs
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Maxim Kazmin, 123RF.com
2 3 4 5 6 7 8 0 0 0 0 1 1 1 1 2 1 0 0 0 0 0 0
28%
Securing the container environment
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © zeferli, 123RF.com
--server 3.71.72.105 -i Figure 2: Getting all secrets from containers in the cluster. 6. Container breakouts: Attackers might exploit vulnerabilities
28%
Selecting compilers for a supercomputer
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image Photo by Michal Kmet on Unsplash
with approximately 8,200 cores each, and six newer islands with 14,300 cores each. It achieves a speed of around 6 petaFLOPS (10^15 floating-point operations per second). In total, almost 500TB of main memory
28%
Security analysis with Security Onion
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Mick Haupt on Unsplash
and patterns in the log data and then generate alarms or events from the corresponding data for further processing by analysts. Security Onion comes with more than 500 of these Plays, which you can use as
28%
The achievements of and plans for systemd
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lennart Poettering CC-BY-SA-3.0
are expensive, with only 1,000 of them (or sometimes only 100 or 500, depending on the distribution), and they are allocated individually during package installation. So traditionally they can only be used
28%
RADOS and Ceph: Part 2
22.10.2012
Home »  HPC  »  Articles  » 
example creates a Crush map for a setup consisting of six OSDs (i.e., individual storage devices in servers) distributed over three racks: crushtool --num_osds 6 -o crush.example.map --build host straw 1
28%
Multicloud management with Ansible
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Pawel Nolbert on Unsplash
module can create multiple VMs in a single pass. For example, after a successful rollout of the two test VMs on AWS, the inventory created in this way will have the following information: [ec2] 100

« Previous 1 ... 34 35 36 37 38 39 40 41 42 43 44 45 46 47 ... 53 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice