Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (483)
  • Article (84)
  • News (6)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 Next »

31%
Moving your data – It's not always pretty
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
digifuture, 123RF
with a presentation by Marc Stearman from Lawrence Livermore National Laboratory. The title of his talk was "Sequoia Data Migration Experiences" [2]. Sequoia is a large petascale system with 55PB of storage running
31%
Caching with CacheFS
07.07.2020
Home »  HPC  »  Articles  » 
. This architecture allows FS-Cache to use alternative caching mechanisms. The first implementation of CacheFS was developed by Sun Microsystems in 1993 for the Solaris 2.3 operating system. After that, other versions
31%
Three full-text desktop search engines
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by Lucas Gallone on Unsplash
at least two other recent tools that, according to their brief descriptions, would be suitable for the task I set: DocFetcher [2] and Recoll [3] specialize in full-text search and were built for use
31%
Network Grep
26.11.2012
Home »  Articles  » 
 
'tcp[13] & 2 = 2' Matching either SYN only or SYN-ACK datagrams Instead, these looked more like a demonstration of why I should have listened to my mathematics teacher properly when I was still
31%
MobaXterm: Unix for Windows
23.07.2012
Home »  Articles  » 
 
. Walk-Through When you first start MobaXterm, an alarm might be activated by Windows Firewall. If you then type allow , you can define a suitable rule. Then, MobaXterm will show you a local terminal
31%
Extended detection and response in networks, endpoint devices, and the cloud
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Kritiya, 123RF.com
management task. Laws, regulations, and the associated rules of critical infrastructures (CRITIS) make it clear how great is this threat and the need for suitable countermeasures. Manufacturers and service
31%
Cyber security for the weakest link
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Geran de Klerk on Unsplash
such a hacker currently proceed in practice? In principle, an attack always follows the same phases: 1. Break-in 2. Persistence 3. Preparatory work (lateral movement) 4. Perseverance and system surveillance
31%
KubeVirt integration in OpenShift and Rancher
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Photo by Darren Halstead on Unsplash
of managing containers but can also handle virtual networks, distributed storage, and, of course, the matching security rules and access authorizations. Extensions for Kubernetes save their current
31%
A GUI for Warewulf 4
06.05.2025
Home »  Articles  » 
transfer) API. REST API A REST API is a set of rules and guidelines for building web services that use HTTP requests and responses to communicate between the client and server. This API is a companion
31%
Kubernetes StatefulSet
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Ashley Light on Unsplash
on Kubernetes (see the box "Kubernetes Test with Microshift"). The example uses StatefulSet to ensure that an application with a state always has the appropriate persistent storage available (Figures 1 and 2

« Previous 1 ... 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice