Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (446)
  • Article (133)
  • News (5)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 42 43 44 45 46 47 48 49 50 51 52 53 54 55 ... 59 Next »

12%
Benchmarks Don’t Have to Be Evil
12.03.2015
Home »  HPC  »  Articles  » 
, after the system is installed, the requested benchmarks are often re-run to make sure it meets the vendor’s guarantees. This again delays putting the system into production. On the vendor side, I used
12%
Galera Cluster for MySQL
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Noel Powell, fotolia.com
for internal communication in the node and one for communication with the applications. The following example uses CentOS 6.2 with the newest updates. At first, the installer should make certain that all
12%
The RADOS object store and Ceph filesystem
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Brigida Soriano, Fotolia.com
Cloud computing is, without a doubt, the IT topic of our time. No issue pushes infrastructure managers with large-scale enterprises as hard as how to best implement the cloud. The IaaS principle
12%
Multicore Processing in Python
22.08.2017
Home »  HPC  »  Articles  » 
of Python is that it’s possible to write extensions in other languages that can be loaded as modules using “wrapper” tools. For example, you can write extensions in Fortran and C as Python modules with tools
12%
Take your pick from a variety of AWS databases
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Claudia Paulussen, Fotolia.com
For quick and easy access to databases in the cloud, you will find the most popular types in the form of a database-as-a-service (DBaaS). In addition to relational databases, NoSQL alternatives
12%
Forensic Analysis on Linux
30.04.2013
Home »  Articles  » 
forensic analysis application. Memory Dumping Current kernel versions restrict access to the Linux system’s main memory. In the past, you could use two device drivers, /dev/mem and /dev/kmem , to read
12%
Speed up Your Name Server with a MySQL Back End
23.07.2013
Home »  Articles  » 
 
be IP addresses to much more humanly digestible addresses. Thankfully, we no longer live in the early days of the Arpanet (precursor to today’s Internet), where we had to transfer large host files from
12%
Booting Windows from a compressed image
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © ximagination, 123RF.com
Index:1 /DestinationImageFile:C:\Temp\install_wimboot.wim 02 03 md C:\mount\Windows 04 Dism /Mount-Image /ImageFile:"C:\Temp\install.wim" /Index:1 \ /MountDir:C:\mount\Windows 05 06 attrib -s -h C
12%
Improved defense through pen testing
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image Photo by Simeon Jacobson on Unsplash
. Table 1 Pen Testing Steps Activity Description Tool(s) Used Hacker Lifecycle Step Profile the resource and/or user Use active and passive scanning techniques
12%
Analyzing tricky database problems
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Photo by Quino Al on Unsplash
. The infrastructure also includes three LDAP servers, six NFS servers (based on Ceph), and two HAProxy load balancers. Monitoring is done via Graphite [5], with an Elasticsearch [6], Logstash [7], and Kibana [8] (ELK

« Previous 1 ... 42 43 44 45 46 47 48 49 50 51 52 53 54 55 ... 59 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice