Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %6mbps Llorente"52 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1000)
  • Article (274)
  • News (127)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 51 52 53 54 55 56 57 58 59 60 61 62 63 64 ... 141 Next »

17%
CoffeeScript: A Replacement for JavaScript?
05.03.2013
Home »  Articles  » 
 
. You must have at least version 1.1.6x of npm (try npm --version ). If not, GitHub has an informative page on how to install current packages for various distros. As soon as you have installed this duo
17%
Setting up an OpenNebula Cloud
05.09.2011
Home »  CloudAge  »  Articles  » 
 
the fixed network template file specified in Listing 4, save the contents of Listing 4 to a file called network.template, and enter the commands shown in Listing 6. Listing 6 Creating a Virtual
17%
Virtualization with KVM
29.06.2011
Home »  CloudAge  »  Articles  » 
 
memory to the existing machines. Luckily, KVM became an official component of all Linux kernels as of version 2.6.20. In other words, you only need to install Qemu and a couple of tools. Most
17%
Understanding Privilege Escalation
13.12.2011
Home »  Articles  » 
 
, 28 ports open for incoming connections, and 441 packages installed and not updated for a while. Listing 2: grep, ps and netstat example results user@metasploitable:~$ uname -a Linux metasploitable 2.6
17%
OpenACC – Data Management
07.02.2019
Home »  HPC  »  Articles  » 
, copyout, allocates memory on the accelerator when entering the accelerated region but only copies data from the accelerator to the host when exiting the OpenACC data region (Table 6). No data is copied from the host
17%
Detecting intruders with Suricata
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Kurhan, 123RF.com
as suspicious. Suricata has a stable code base, and it is used throughout the industry. Although hardly as widely adopted as Snort, Suricata has the ability to monitor both IPv4 and IPv6 traffic, as well
17%
Exploring Kubernetes with Minikube
11.09.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Ain't Markup Language'' [6]), so be careful. Listing 2:nginx.tml 01 --- 02 03 apiVersion: extensions/v1beta1 04 kind: Deployment 05 metadata: 06 name: nginx-dep 07 spec: 08 replicas
17%
Automatic build and deploy with OpenShift and GitLab CI
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Photo by Jantine Doornbos on Unsplash
and deploy slides automatically with OpenShift on every new commit in the Git repository. The slides are available online [5] and the source code of this example is available at the CETIC Git repository [6
17%
The new OpenStack version 2014.1 alias "Icehouse"
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Jakub Krechowicz, 123RF.com
to be heartily unimpressed by the hustle and bustle of Neutron, because more functionality inevitably comes at the price of more complexity. In Icehouse, the order of the day seems to be IPv6. To date, IPv6
17%
Spanning Tree Protocol
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Connection Costs Bandwidth Costs 10 Mbps 100 16 Mbps  62 100 Mbps  19 200 Mbps  12 622 Mbps  6 1 Gbps  4

« Previous 1 ... 51 52 53 54 55 56 57 58 59 60 61 62 63 64 ... 141 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice