Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %220mb 12 00s Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (399)
  • Article (115)
  • News (20)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 47 48 49 50 51 52 53 54

9%
GlusterFS Storage Pools
17.11.2016
Home »  HPC  »  Articles  » 
the trusted storage pool, you simply add additional servers to the existing federation. The example here is based on Fedora 22 and is designed to provide back-end storage for virtual systems based on Qemu
9%
Hyper-V with the SMB 3 protocol
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Vladimir Kramin, 123RF.com
into Windows in the mid-1990s via LAN Manager. Microsoft modified SMB 1.0 and submitted it to the Internet Engineering Task Force (IETF), and SMB was renamed to CIFS (Common Internet File System). Microsoft
9%
Arm yourself against cloud attacks
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © sandra zuerlein, Fotolia.com
rules still apply. The attacker cannot open port 22 to the outside by deleting the corresponding Netfilter rule to gain access to the system by SSH. How security groups can be used in AWS is explained
9%
Build storage pools with GlusterFS
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © jala, Fotolia.com
the trusted storage pool, you simply add additional servers to the existing federation. The example here is based on Fedora 22 and is designed to provide back-end storage for virtual systems based on Qemu
9%
How vector databases work and when they're used
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © neyro2008, 123rf.com
as a service (SaaS) tool, such as the co.embed API [5], to create the embeddings. Using Vector Databases The challenge with vector searches begins with identifying similar documents in a very large set
9%
Intrusion Detection with OSSEC
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Photo by Rayner Simpson on Unsplash
attacks such as port scans, connection breaches, and distributed denial-of-service (DDoS) attacks. In this article, I show you how to set up the server and the clients. You can also set up OSSEC
9%
HPCCM with Docker and Podman
09.09.2024
Home »  HPC  »  Articles  » 
to maintain than a long specification file, and because it’s Python, you can use any Python code or tools as part of the recipe. The recipe uses “building blocks” for capabilities such as compilers, libraries

« Previous 1 ... 47 48 49 50 51 52 53 54

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice