Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (544)
  • Article (132)
  • News (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 52 53 54 55 56 57 58 59 60 61 62 63 64 65 ... 68 Next »

10%
A Hands-on Look at Kubernetes with OpenAI
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Luxuz, photocase.com
.126.22.9 Ready 3h v1.6.2 Listing 2 Kubernetes Node Data Structure in YAML $ kubectl get node 10.126.22.9 -o yaml apiVersion: v1 kind: Node metadata: creation
10%
Controlling virtual machines with VNC and Spice
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Oleg Doroshin, 123RF.com
with VNC. Unfortunately, Spice does not work out of the box with all distributions. The use of Spice is well supported on Fedora and RHEL. But both VNC and Spice reach their limits if you need 3D graphics
10%
Setting up Windows clients with Chef
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Sebastian Kaulitzki, 123RF.com
, or something of that ilk, then appears. Now you have to create the user and organization – they are essential for managing the configuration data: sudo chef-server-ctl user-create admin tam hanna tamhan@tamoggemon.com
10%
SC24 – Bursting at the Seams
07.01.2025
Home »  HPC  »  Articles  » 
SC24 took place in Atlanta, GA, November 17-22. As I'm writing this, 17,959 attendees – that’s 3,000+ more than last year – registered. More than 500 companies filled the exhibition floor, which
10%
Diving into infrastructure security
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © JPaget RFphotos, 123RF.com
. Classic antivirus programs protect your computer by means of bytecode signatures or use heuristics that combine special system calls or file and hardware access. HIDS also monitors user actions, files
10%
The Cloud’s Role in HPC
05.04.2013
Home »  HPC  »  Articles  » 
, assume the building block is a four-socket AMD node with 16 cores per socket (64 physical cores). Also assume that you oversubscribe the physical cores 3:1, producing 192 VMs per physical server
10%
Setting up and managing IPv6 on Windows Server 2016
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © Photo by mathyas kurmann Unsplash.com
looks like this: 001:0db7:85b3:07d3:1319:8a2d:437a:63d4 . These addresses are difficult to memorize and assign manually. Consequently, automatic assignment is the way to go in IPv6 infrastructures. All
10%
Red Hat’s Cloud Tools
08.07.2013
Home »  Articles  » 
 
, Rails, Rack, Symfony, Zend, Django, and Twisted. In terms of data storage, OpenShift supports all major database management systems, including MySQL, SQLite, and MongoDB. After the release of version 7
10%
Processor and Memory Affinity Tools
14.09.2021
Home »  HPC  »  Articles  » 
 decodeassists pausefilter pfthreshold avic v_vmsave_vmload vgif umip rdpid overflow_recov succor smca Also note the single socket and one NUMA node. The output also lists the L1d (data) cache as 1MiB, the L1i
10%
Professional virtualization with RHV4
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Steve Cukrov, 123RF.com
for running the Machine Manager more or less automatically as a hosted engine. RHV4 Architecture Setting aside the underlying data of the hypervisor, in which KVM, Xen, vSphere, and Hyper-V traditionally do

« Previous 1 ... 52 53 54 55 56 57 58 59 60 61 62 63 64 65 ... 68 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice