Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcomm 12!600 Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (364)
  • Article (120)
  • News (7)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 37 38 39 40 41 42 43 44 45 46 47 48 49 50 Next »

17%
Evaluating logfiles with Microsoft Log Parser Studio
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Thomas Lammeyer, Fotolia.com
from systems such as the IIS, Microsoft Exchange ActiveSync, Exchange Web Services (EWS), or Outlook Web Access (OWA). Installation under .NET .NET Framework 4.x and Log Parser 2.2 [2] form the basis
17%
Time-series-based monitoring with Prometheus
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Juthamas Oonhawat, 123RF.com
of these is node_exporter [12], which reads and provides operating system metrics such as memory usage and network load. Meanwhile, a number of exporters [13] exist for a wide range of protocols and services
17%
Shared Storage with NFS and SSHFS
12.09.2018
Home »  HPC  »  Articles  » 
. Moreover, you don't need to add or run a special client tool on the client nodes or a special server tool on the storage node; SSH just needs to be active on your system. Almost all firewalls allow port 22
17%
Shared Storage with NFS and SSHFS
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Oleksiy Mark, 123RF.com
't need to add or run a special client tool on the client nodes or a special server tool on the storage node; SSH just needs to be active on your system. Almost all firewalls allow port 22 access, so you
17%
A smoke-jumping admin's best friend
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Thomas Detert, Fotolia.com
. It is written in Python and has bindings for other languages. It also can be coupled with curses-based plotting if desired. A YouTube video explains some uses for psutil [12]. Non
17%
Live migration of virtual machines with KVM
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © SV-Luma, 123RF.com
>/virtstore 10 11 0755 12 -1 13 -1 14 15 16 Save this XML file
17%
Julia: A New Language For Technical Computing
31.05.2012
Home »  HPC  »  Articles  » 
_mat_stat 3.37 39.34 11.64 54.54 22.07 8.12 rand_mat_mul 1.00 1.18 0.70 1.65 8.64 41.79 Table 1: Benchmark Times
17%
Server administration with Cockpit
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Photo by Joshua J. Cotten on Unsplash
, much has changed. The Red Hat-sponsored project is now available for Fedora, Red Hat Enterprise Linux (RHEL), CentOS, Debian (version 9 and above), and Ubuntu (17.04 and above) and runs on x86
17%
Trivy security scanner
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Lead Image © MPower, photocase.com
19 ******************************************/ 20 module "gke" { 21 source = "terraform-google-modules/kubernetes-engine/google" 22 project_id = var.project_id 23
17%
New security features in Windows 10
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Duncan Andison, 123RF.com
, but Microsoft assumes many manufacturers will provide biometric hardware solutions in the next 12 months. The situation already looks better for fingerprint sensors. All available solutions are supported

« Previous 1 ... 37 38 39 40 41 42 43 44 45 46 47 48 49 50 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice