Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (705)
  • Article (160)
  • News (135)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 58 59 60 61 62 63 64 65 66 67 68 69 70 71 ... 101 Next »

15%
Top three HPC roadblocks
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Alexey Bogatyrev, 123RF.com
the beginning, the nature of HPC computing, in particular, makes programming of even the smallest resource difficult. Even a quad-core desktop or laptop can present a formidable parallel programming challenge
15%
Real-World HPC: Setting Up an HPC Cluster
04.11.2011
Home »  HPC  »  Articles  » 
communication between nodes and management interfaces will occur. The second Ethernet interface (eth1 ) will connect to the public network for remote user and admin login. This is important to note because
15%
Monitoring Storage with iostat
25.02.2013
Home »  HPC  »  Articles  » 
If you are a system administrator of many systems, or even of just a desktop or laptop, you are likely monitoring your system in some fashion. This is particularly true in high-performance computing
15%
Safe Files
16.04.2015
Home »  HPC  »  Articles  » 
on its laptops that allows the software to steal web traffic using man-in-the-middle attacks. When you use an encrypted filesystem or SEDs, all of the data is encrypted. However, if you forget
15%
Kubernetes Auto Analyzer
05.10.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
to use a local Minikube installation on my laptop to generate a report. (Minikube is a sophisticated, localized, stripped-down Kubernetes build that is great for testing and lacks the complexities a cloud
15%
Encrypting files
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Yoichi Shimizu, 123RF.com
] on its laptops that allows the software to steal web traffic using man-in-the-middle attacks. When you use an encrypted filesystem or SEDs [3], all of the data is encrypted. However, if you forget
15%
Get started with OpenShift
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © andegro4ka, 123RF.com
|vmx)" /proc/cpuinfo should return svm or vmx in colored text. On my Ubuntu 18.04 laptop, I see vmx in red text, because Intel VT is available on my machine. As the root user, you will install KVM: $ apt
15%
Three full-text desktop search engines
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by Lucas Gallone on Unsplash
of a search engine. The duo shows how powerful modern search systems can be. Today's PCs and recent laptops offer enough performance to index files with this combination; however, the high overhead is hardly
15%
Server Virtualization with VirtualBox
18.09.2012
Home »  Articles  » 
 
can control VirtualBox VMs on the server remotely and conveniently. Why VirtualBox? VirtualBox offers a number of advantages compared with other virtualization solutions. For example, the program
15%
Analyzing Kernel Crash Dumps
25.11.2012
Home »  Articles  » 
 
.unknown_nmi_panic = 1 # Techniques for managing remote computers, such as iLO (integrated Lights-Out) by HP or DRAC (Dell Remote Access Controller) by Dell, let you manually trigger an NMI event, which then triggers

« Previous 1 ... 58 59 60 61 62 63 64 65 66 67 68 69 70 71 ... 101 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice