Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %2522Rub&253%2000 Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (452)
  • Article (116)
  • News (34)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 36 37 38 39 40 41 42 43 44 45 46 47 48 49 ... 61 Next »

29%
Understanding the Status of Your Filesystem
18.06.2014
Home »  HPC  »  Articles  » 
understanding of your storage, which can lead to better policies or improved performance. Several tools allow you to scan your filesystem and gather information about file metadata. For example, it’s pretty
29%
Many Clouds, One API
22.08.2011
Home »  Articles  » 
 
to migrate easily to other providers at a later stage. Apache Deltacloud addresses this issue by offering a standardized API definition for infrastructure as a service (IaaS) clouds with drivers for a range ... to migrate easily to other providers at a later stage. Apache Deltacloud addresses this issue by offering a standardized API definition for infrastructure as a service (IaaS) clouds with drivers for a range
29%
Container and hardware e-virtualization under one roof
17.10.2011
Home »  CloudAge  »  Articles  » 
 
, 5900 for VNC and optionally 22 for SSH) and thus a minimal attack surface (Figure 4). You can use the web interface in Administration | Server to decide which services you want to provide
29%
Greylisting with Postgrey
22.06.2012
Home »  Articles  » 
 
(depending on which study you believe), then it’s hardly surprising that vendors continue to develop new defences against one of the Internet’s most notorious pests. Spammers only continue to send unsolicited
29%
Wireshark
27.11.2011
Home »  Articles  » 
 
to the network interface’s link layer. Administrators can control Tcpdump’s behavior at the command line by passing in parameters, including the filters to use. Ethereal and Wireshark Because a command
29%
GlusterFS Storage Pools
17.11.2016
Home »  HPC  »  Articles  » 
the trusted storage pool, you simply add additional servers to the existing federation. The example here is based on Fedora 22 and is designed to provide back-end storage for virtual systems based on Qemu
29%
Modern Fortran – Part 2
15.12.2016
Home »  HPC  »  Articles  » 
Fortran 90 catapulted Fortran from a perceived “old” language to a modern language on equal footing with any other. It retained Fortran’s history of simplicity and performance, but it added features
29%
How Old is That Data?
20.04.2017
Home »  HPC  »  Articles  » 
to understand what’s going on with your storage, even on your desktop or laptop. Studies of Data Age A few years ago, a study from the University of California, Santa Cruz, and NetApp examined CIFS storage
29%
ClusterHAT
10.07.2017
Home »  HPC  »  Articles  » 
want to put them on the bottom of your host node (Figure 1). Putting everything together is very easy, and you can watch a video on the ClusterHAT website to show how it’s done
29%
Performance Health Check
13.06.2022
Home »  HPC  »  Articles  » 
are running, the amount of memory is correct, networking is up, and so on. I refer to this as the “state” of the node’s health. In that same article, I mentioned Node Health Check (NHC), which is used

« Previous 1 ... 36 37 38 39 40 41 42 43 44 45 46 47 48 49 ... 61 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice