Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (46)
  • News (6)
  • Article (5)
Keywords

« Previous 1 2 3 4 5 6 Next »

46%
The Resurrection of bWatch
02.06.2025
Home »  Articles  » 
Photo by NASA Hubble Space Telescope on Unsplash
found that the list of nodes (hosts) is specified in a file named .bWatchrc.tcl  in the root directory: set listOfHosts {node1 node2 node3 node4 node5 node6 node7 node8} I’m not sure what restrictions
46%
Identify malicious traffic with Maltrail
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Andrea De Martin, 123RF.com
demanding in terms of resource requirements. In addition to a Python interpreter (version 2.6 or greater), you need to install the pcapy-ng package. If you use Python 3.x, this will be pcapy instead. You
46%
How vector databases work and when they're used
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © neyro2008, 123rf.com
space. © Qdrant [6] Figure 5: The encoder calculates vectors that refer to points closer together if the designated objects are more similar to each
46%
Monitor applications end to end
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Photo by Adam Winger on Unsplash
. Robot Framework integrates the RobotMK extension [6] into the CheckMK monitoring system (Figure 5). CheckMK 2.3 is available in the form of the CheckMK Synthetic Monitoring [7] add-on. In all cases
46%
Getting your virtual machine dimensions right
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by ROCCO STOPPOLONI on Unsplash
have 26 cores or 52 hyperthreads per NUMA node for the VM. Figure 2 shows a four-socket server with 28 cores per socket and 6TB of RAM. Figure 2: A four
46%
Anonymization and pseudonymization of data
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Debby Ledet on Unsplash
M 12345 5 36 F 12346 6 34 M 12347 Anonymized Data (k=3) 1 30-40 * 123## 2 30
46%
SC24 – Bursting at the Seams
07.01.2025
Home »  HPC  »  Articles  » 
the system. Fugaku was number 1 on the HPL list for a while and is number 6 today, but it has been number 1 on the HPCG list for four years. Let me illustrate why it is so dominant. Fugaku was first
46%
Integrate remote cloud storage
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © rawintanpin, 123RF.com
it up. After the install, the graphical dashboard (Figure 6) automatically appears in your local web browser. You can call it up again later at any time by typing http://127.0.0.1:5572/ in the address
46%
Inventory and manage your IT systems
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Edryc James P. Binoya on Unsplash
customers a more comprehensive suite of IT management tools. The most recent version 5.6.2 was released in January 2025 by Mark Unwin, who is still actively involved in the project. The software is available
46%
NVMe-oF gears up to replace iSCSI
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Mathew Browne on Unsplash
to serious errors or security issues. Instead, the hard work is being allocated to the NVMe-oF target for RADOS – I will get back to that later. Whether you like it or not, Red Hat Ceph Storage 6 no longer

« Previous 1 2 3 4 5 6 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice