Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %220mb%3%A9n Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (411)
  • Article (142)
  • News (34)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 37 38 39 40 41 42 43 44 45 46 47 48 49 50 ... 60 Next »

17%
Live migration of virtual machines with KVM
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © SV-Luma, 123RF.com
to the driver attributes (Listing  2). Now you can start migrating a VM manually as follows: virsh migrate --live fedora-22 qemu+ssh://node2/system Listing 2 XML File Disk Settings 01 02
17%
Managing GPT-4 on the Network
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Photo by Cécile Brasseur on Unsplash
business mode, which also protects the other data in the browser. The Microsoft 365 E3/E5 and A3/A5 and Business Standard/Premium subscriptions all have access to Bing Chat Enterprise (see the box "Bing
17%
Introducing the NoSQL MongoDB database
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Wesley Tingey on Unsplash
, the use of in-memory storage engines, and advanced compression algorithms. MongoDB Atlas is the fully managed, cloud-based database-as-a-service (DBaaS) platform. Atlas automates management tasks (i
17%
Hardening mail servers, clients, and connections
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by jesse ramirez on Unsplash
use Ubuntu 22.04, but you can apply all the advice to other distributions, too. ClamAV is used in conjunction with SpamAssassin as a tool for filtering mail. Where action relating to name servers
17%
Code IaC for provisioning of preconfigured virtual environments
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © vladnikon, 123RF.com
is an excellent Bicep-based reference and starting point that helps you get up and running quickly [3]. Table 1 BICEP Resource Definitions Resources Versioned w/@yyyy-mm-dd-state Common
17%
Web Cryptography API
26.11.2013
Home »  Articles  » 
ability of web browsers to encrypt and decrypt application data using JavaScript, is currently under review by the World Wide Web consortium (W3C) as a draft. This promising technology reaches well beyond
17%
Load Testing the Cloud
20.02.2012
Home »  CloudAge  »  Blogs  »  Dan Frost's Blog  » 
 
time: 11.79 secs Data transferred: 2.47 MB Response time: 0.22 secs Transaction rate: 35.79 trans/sec Throughput: 0
17%
GUI or Text-Based Interface?
05.12.2018
Home »  HPC  »  Articles  » 
Administrative TUIs  bmon Monitoring and debugging tool designed to capture and display networking statistics; capable of text-based plots. A short YouTube video
17%
Introducing parity declustering RAID
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Lead Image © Author, 123RF.com
/s, 133M issued at 133M/s, 81.6M total 0B repaired, 163.06% done, no estimated completion time scan: resilvered (draid1:3d:5c:1s-0) 20.2M in 00:00:00 with 0 errors on Mon Oct 24 17:11:22 2022
17%
Selecting compilers for a supercomputer
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image Photo by Michal Kmet on Unsplash
code is written and compiled in one of three classic HPC languages: Fortran [2], C++ [3], or C [4]. Why these languages? Because they have enabled generation of very efficient code for a long time

« Previous 1 ... 37 38 39 40 41 42 43 44 45 46 47 48 49 50 ... 60 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice