Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (978)
  • Article (306)
  • News (84)
  • Blog post (7)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 52 53 54 55 56 57 58 59 60 61 62 63 64 65 ... 138 Next »

28%
OpenStack: Shooting star in the cloud
21.05.2014
Home »  Articles  » 
Stack now designates a very comprehensive collection of components that join forces to take care of automation. The various OpenStack components each handle a specific part of the overall system. The Open
28%
Denial of Service in the Cloud
12.11.2013
Home »  Articles  » 
the attackers were bent on disruption rather than robbery, cost over a billion dollars to clean up. Many Vectors and DNS Floods Today’s DDoS attacks in the cloud have very little in common with the chaotic
28%
Tuning I/O Patterns in C
31.07.2013
Home »  HPC  »  Articles  » 
is 3,328 bytes. That is a very small amount of data per write function. In fact, 4KB is typically used as the size when testing IOPS performance (i.e., very small writes). However, I’m writing 32KB
28%
Kickstack: OpenStack with Puppet
22.06.2014
Home »  Articles  » 
if you do not want an all-in-one setup. The problem is compounded by the many commands in the scope of the OpenStack setup that are not very intuitive and make little sense at first glance. Those who have
28%
Container and hardware e-virtualization under one roof
17.10.2011
Home »  CloudAge  »  Articles  » 
 
and deploys the basic system. Figure 3: Apart from the network parameters, the administrator has very little influence on the Proxmox VE installation
28%
Visualize Your Network
27.10.2011
Home »  Articles  » 
 
with very cleverly. MRTG’s plain text logfile contains an entry for each collected sample on a specific device. Through some smoke and mirrors, the flat text file doesn’t grow too large or grow out of control
28%
Intruder Tools
13.12.2011
Home »  Articles  » 
 
they are subject to attack. Domain Tools Intruders and penetration testers use a number of tools to obtain DNS information. Many of these tools are very familiar to IT professionals. Tools such as nslookup
28%
Linux Essentials for Windows Admins – Part 2
06.08.2012
Home »  Articles  » 
 
.txt Public Videos The basic ls command displays very little information about the directory’s contents except for file names. On most Linux systems, the ls command shows you a color-coded file listing
28%
Stat-like Tools for Admins
19.11.2014
Home »  HPC  »  Articles  » 
vmstat). Dstat also presents the output in color. Figure 2: Dstat output while running Python code. Although dstat is very similar to vmstat
28%
Compiler Directives for Parallel Processing
12.08.2015
Home »  HPC  »  Articles  » 
point. OpenACC has two major versions: Version 1.0 of the standard, announced November 14, 2011, included a number of directives for coding accelerators (initially GPUs), and very quickly Open

« Previous 1 ... 52 53 54 55 56 57 58 59 60 61 62 63 64 65 ... 138 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice