Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %25x20mm&253%25390 Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (455)
  • Article (118)
  • News (34)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 54 55 56 57 58 59 60 61

29%
Using the Expect scripting environment
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Ivan Mikhaylov, 123RF.com
} 19 20 -re "($|%|>) " { interact } 21 22 timeout { 23 send_tty "No response from $host\n" 24 exit 25 } 26 } The script begins as usual by saving its arguments into variables
29%
Storage system with OpenSolaris and Comstar
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Aleksandr Fomenkov, 123RF.com
.168.209.200 07 192.168.209.200:3260,1 iqn.1986-03.com.sun:02:8f4cd1fa-b81d-c42b-c008-a70649501262 08 # iscsiadm -m node 09 # /etc/init.d/open-iscsi restart 10 # fdisk -l 11 Disk /dev/sdb: 2147 MB, 2147418112 bytes
29%
Configuration management with Chef
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Alistair Cotton, 123RF.com
the computer on which it is running. The first thing you need to have in place is Ruby version 1.8.5 through 1.9.2 (with SSL bindings). Add to this, RubyGems, which will want to build various extensions
29%
Avoiding common mistakes in high-performance computing
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Maxim Kazmin, 123RF.com
, but you will be spending time deciphering instructions, hunting down tools, and undoing missteps before you can enjoy your new furniture. Indeed, should you not have the mechanical inclination to put bolt A ... 9
29%
Predicting Drive Doom
20.10.2013
Home »  HPC  »  Articles  » 
Modern drives use S.M.A.R.T. (self-monitoring, analysis, and reporting technology) to gather information and run self-tests. Smartmontools is a Linux tool for interacting with the S.M.A ... ://smartmontools.sourceforge.net === START OF INFORMATION SECTION === Device Model: Samsung SSD 840 Series Serial Number: S19HNSAD620517N LU WWN Device Id: 5 002538 5a005092e Firmware Version: DXT08B0Q User Capacity: 120,034,123,776 bytes ... Modern drives use S.M.A.R.T. (self-monitoring, analysis, and reporting technology) to gather information and run self-tests. Smartmontools is a Linux tool for interacting with the S.M.A ... S.M.A.R.T., Smartmontools, and Drive Monitoring
29%
How graph databases work
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © iofoto, Fotolia.com
21 # The name and age of the persons who know the person with ID 1: 22 gremlin> g.V(1).outE('knows').inV().valueMap('name', 'age') 23 ==>[name:[vadas],age:[27]] 24 ==>[name:[josh],age:[32]] 25 26
29%
Moving your data – It's not always pretty
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
digifuture, 123RF
to NFS-export the storage to the data mover. Then, just copy the data between mountpoints. For example: $ cp -a --preserve=all -r /old_storage/data /new_storage/data Be warned that if you use NFS, you
29%
Exploring PowerDNS
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © ladyann, 123RF.com
should do a bit of testing to make sure it is working: primary:~$dig +norecurs @127.0.0.1 ns1.example.com A dig +norecurs @127.0.0.1 ns1.example.com A ; <<>> DiG 9.9.2-P1 <<>> +norecurs @127.0.0.1 ns1
29%
OpenStack workshop, part 2: OpenStack cloud installation
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Anatoly Terebenin, 123RF.com
, this example uses 192.168.144.0/25. Because in Quantum, public IP addresses are not directly assigned to the individual VMs (instead, they use the network node and its iptables DNAT rules for access to it
29%
Profiling Python code
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image ©-Yong Hian Lim, Fotolia.com
of code. Listing 1 Time to Execute import time start_time = time.time() # Code to check follows a, b = 1,2 c = a + b # Code to check ends end_time = time.time() time_taken = (end_time- start

« Previous 1 ... 54 55 56 57 58 59 60 61

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice