Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (633)
  • Article (151)
  • News (13)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 35 36 37 38 39 40 41 42 43 44 45 46 47 48 ... 80 Next »

23%
The Cloud’s Role in HPC
05.04.2013
Home »  HPC  »  Articles  » 
, and they won’t be pushing the performance of the systems; however the data center will need a number of systems for the class. If they need 20 cores per student, that’s 600 cores just for this single course
23%
Filesystem Encryption
12.05.2014
Home »  Articles  » 
 
]$ cd ~/encrypted [laytonjb@test1 encrypted]$ ls -l total 8 lrwxrwxrwx 1 laytonjb laytonjb 24 Sep  4 15:12 acS5u3K9TJ,9FWTDUq0yWqx6 -> XuD50Mah2kp2vukDeo04cOv, -rw-rw-r-- 1 laytonjb laytonjb 18 Sep  4 15:12 WvPjlWtCaq5g9hE1
23%
PowerShell Part 2: Manipulating Services, Processes, and Commands
17.04.2012
Home »  Articles  » 
 
Control Manager on computer 'XENAPP0'. This operation might require other privileges. At line:1 char:12 + Get-Service <<<< -ComputerName XENAPP0 + CategoryInfo : NotSpecified: (:) [Get
23%
VTP for VLAN management
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © bluedarkat, 123RF.com
active Fa0/1, Fa0/2, Fa0/3, Fa0/4, Fa0/5, Fa0/6, Fa0/7, Fa0/8, Fa0/9, Fa0/10, Fa0/11, Fa0/12 10
23%
Acquiring a Memory Image
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © lightwise, 123RF.com
.168.1.129 -p 3260 specifying that the target Windows computer with the Subject USB stick is at 192.168.1.129 and listening on port 3260. The system connects to targets iqn.2008-02.com.f-response.cr0wn-d00
23%
Updating Small Business Server 2008
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Petra Wanzki, Fotolia
.SharePoint.Search.Administration.SPSearchService,Microsoft.SharePoint.Search,Version=12.0.0.0,Culture=neutral, PublicKeyToken=71e9bce111e9429c" -servicename spsearch Then, change the login name
23%
Planning Performance Without Running Binaries
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Lucy Baldwin, 123RF.com
), which is derived by observing that you can use as many CPUs as you want to drive 95 percent of the problem asymptotically to zero time (p =0.95), and you will be left with that one minute (1 – p =0
23%
Monitoring daemons with shell tools
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Shariff Che'Lah, 123RF.com
check) or as RC scripts. Listing 2 CUPS Monitoring 01 #! /bin/sh 02 03 while true 04 do 05 06 lpq -Plp | grep -q "lp is ready" 07 08 if [ $? -gt 0 ] 09 then 10 cupsenable lp 11 fi 12
23%
Using the Expect scripting environment
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Ivan Mikhaylov, 123RF.com
$spin 08 @$molecule.xyz 09 10 END 11 12 done 13 done The Gaussian 09 (g09) computational chemistry simulation package uses a small input that tells it what type of predictions are desired and which
23%
Group policies on Windows Server 2022
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Jack Carter on Unsplash
years without making any further adjustments. Rules and regulations are not static and need to be reviewed every six or 12 months. Where vendors provide updates, you will want to check and integrate

« Previous 1 ... 35 36 37 38 39 40 41 42 43 44 45 46 47 48 ... 80 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice