Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xsede%3 00s Llorente"478 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (909)
  • Article (318)
  • News (100)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 58 59 60 61 62 63 64 65 66 67 68 69 70 71 ... 134 Next »

25%
Best practices for KVM on NUMA servers
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Joe Belanger, 123RF.com
Viewing Server Topology 01 # numactl --hardware available: 8 nodes (0-7) node 0 cpus: 0 1 2 3 4 5 6 7 8 9 node 0 size: 16373 MB node 0 free: 15837 MB node 1 cpus: 10 11 12 13 14 15 16 17 18 19 node 1
25%
AWS Elastic Beanstalk
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Aleksandra Glustsenko, 123RF.com
-894012917938 as Amazon S3 storage bucket for environment data. 2013-05-08 20:03:03 INFO Created load balancer named: awseb-e-m-AWSEBLoa-OXVMML7XC6PR 2013-05-08 20:03:27 INFO Created security group named: awseb-e-mnpsy5
25%
Benchmarking a new architecture
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Lead Image © Lucy Baldwin, 123RF.com
-V architecture [3] (Figure 2). RISC-V is a relatively recent open source CPU instruction set available royalty-free and has successfully drawn interest from more than a dozen chip suppliers so far. It cannot yet
25%
Open source forensics for adaptive detection of threats on CRITIS networks
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © kreminska, 123RF.com
GSvEFc/" date = "2016-01-03" hash = "b90f268b5e7f70af1687d9825c09df15908ad3a6978b328dc88f96143a64af0f" strings: $s0 = "WshShell.Run \"dropbear.exe -r rsa -d dss -a -p 6789\", 0, false" fullword ascii
25%
CoffeeScript: A Replacement for JavaScript?
05.03.2013
Home »  Articles  » 
 
a comment. Numeric sequences can be written concisely as a range. For example, [1..10] stands for numbers 1 to 10. You can use this elegant notation in CoffeeScript to cut out parts from an array. Listing 3
25%
Linux distributions for containers
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © tiero, 123RF.com
an additional section by creating a new profile to do so (see Listing 3). Listing 2 Integrating Vim { "include": "fedora-atomic-docker-host.json", "packages": ["vim"] } Listing 3
25%
Workshop: Container virtualization with LXC on Ubuntu 10.04
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Tormod Rossavik, 123RF.com
=(ALL) ALL replace sudo with admin and quit the chroot environment with exit. Before you can test the container you prepared, you need to configure /lxc/conf.guest in LXC by adding the content from Listing 3
25%
Sovereign Cloud Stack – a genuine alternative for Europe
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © solerf, 123RF.com
closely with the SCS community to develop the version for the SCS KaaS. The result is the Cluster Stacks framework (Figure 3), which has an operator that uses K8s objects to control the entire automation
25%
Chatbots put to the scripting test
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © lexandersikovl, 123RF.com
pc; do if [ "$pn" = "Last" ] || [ "$pn" = "Available" ]; then continue fi pv2=$(rpm -q --qf '%{VERSION}\n' $pn ) IFS='-' read -ra pv3 < "$pv" printf "%-40s %-20s %-20s
25%
Linking Kubernetes clusters
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Lead Image © choreograph, 123RF.com
. The software for this is available from the Kubernetes Cluster Federation project (KubeFed) [1]. Installation In the following example, I assume you already operate a Kubernetes (K8s) cluster. The example uses

« Previous 1 ... 58 59 60 61 62 63 64 65 66 67 68 69 70 71 ... 134 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice