Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (544)
  • Article (132)
  • News (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 41 42 43 44 45 46 47 48 49 50 51 52 53 54 ... 68 Next »

10%
Secure email with IceWarp mail server 10
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
merzavka, 123RF
be used with IceWarp. Access is either via Outlook, another client, or the built-in web client. A real IceWarp advantage is its approach to data storage. Whereas Exchange uses the legacy Jet system
10%
Implement your own MIBs with Python
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
.private.enterprises.netSNmp.netSnmpObjects.nsExtensions.2.2.1.3.7.114.112.105.116.101.109.112 = STRING: "/sys/class/thermal/thermal_zone0/temp" [...] By the way, the double-colon notation shown here is a short form commonly used by all Net-SNMP tools
10%
OpenStack: What's new in Grizzly?
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Oksana Perkins, Fotolia
, the Cinder block storage component appears in a positive light. For example, the software now supports direct connections to Fibre Channel storage and comes with native support for HP 3PAR and EMC storage
10%
HPC Software Road Gets a Bit Smoother
10.09.2013
Home »  HPC  »  Articles  » 
23,289.81 24,823.29 6% SP 19,751.24 12,061.77 39.00% a BT, block tri-diagonal; CG, conjugate gradient; EP, embarrassingly parallel; FT, 3D fast Fourier
10%
The basics of domain-driven design
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © Christos Georghiou, 123RF.com
their tasks as independently as possible (i.e., without calling other bounded contexts). They then are very different from the data-centric services of a service-oriented architecture (SOA). Instead
10%
Linux Writecache
19.11.2019
Home »  HPC  »  Articles  » 
and Configuring Your Environment Identifying the storage volumes and configuring them is a pretty straightforward process: $ cat /proc/partitions  major   minor   #blocks name      7        0      91264 loop0
10%
Incident Analysis with The Hive and Cortex
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © Kurhan, 123RF.com
continuity are all relevant to risk prevention. As an analyst, then, you are dependent on established reporting tools and techniques for the continuous analysis of data to conduct root cause research reliably
10%
Security risks from insufficient logging and monitoring
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Photo by Ryoji Iwata on Unsplash
Institute's 2017 Cost of Data Breach Study: Global Overview: https://www-01.ibm.com/common/ssi/cgi-bin/ssialias?htmlfid=SEL03130WWEN& OWASP Zed Attack Proxy Project: https://www
10%
Getting Ready for the New Ceph Object Store
19.05.2016
Home »  HPC  »  Articles  » 
to access via block device emulation. Clients upload their data to a single OSD, that automatically handles the replication work in the background. For CephFS to serve up the metadata in a POSIX
10%
Ceph Maintenance
12.08.2013
Home »  HPC  »  Articles  » 
in .asok . As an example, you can retrieve the latest performance data for an OSD on Charlie, given an OSD ID of 3, with: ceph --admin-daemon /var/run/ceph/ceph-osd.3.asok perf dump | python -m json

« Previous 1 ... 41 42 43 44 45 46 47 48 49 50 51 52 53 54 ... 68 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice