Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: ▶tippo365.com▶fortune gets how to win jon▶tippo365.com▶fortune gets how to win jackpotzi6 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (756)
  • Article (188)
  • Blog post (3)
  • News (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 60 61 62 63 64 65 66 67 68 69 70 71 72 73 ... 95 Next »

6%
SSHFS for Shared Storage
15.09.2020
Home »  HPC  »  Articles  » 
arcfour arcfour128 arcfour256 blowfish-cbc cast128-cbc chacha20-poly1305@openssh.com As of OpenSSH 7.6, the arcfour , blowfish , and cast ciphers have been removed. Some
6%
Shared Storage with NFS and SSHFS
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Oleksiy Mark, 123RF.com
various versions of compilers, libraries, and tools for building and executing applications. One missing piece is how to share files across a cluster's nodes. File sharing is one of the cornerstones
6%
Monitoring, alerting, and trending with the TICK Stack
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Krishna Kumar-Sivaraman, 123RF.com
data in a time stream. Time series databases are especially practical for the study of trends, with a focus on the value of a parameter over time, so you can guess how this value might develop
6%
Automate the Active Directory Federation Services install
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © drubig-photo, fotolia.com
/fwlink/p/?linkid=236297 Setting up federation services with Office 365: http://blogs.technet.com/b/rmilne/archive/2014/04/28/how-to-install-adfs-2012-r2-for-office-365.aspx/ PowerShell library as a complement
6%
SSL/TLS best practices for websites
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Yevgeniya Ponomareva, Fotolia.com
gets into the wrong hands. The person in charge should keep a copy of the keys in a safe place. Losing the key for a single server is not too bad, because a new one can be easily generated. But, if you
6%
Security data analytics and visualization with R
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Rancz Andrei, 123RF.com
and document the evidence Principle 6: Content is king The subtext of each of these principles is that a graphic should tell a complete, credible story while recognizing that "analytical presentations
6%
Programming with Node.js and JavaScript
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © lightwise 123rf.com
. The most popular is Express [6], which is used in most web applications and offers even more practical capabilities. An alternative would be Director from the Flatiron project, for example. Node Packages
6%
Tools for managing AWS cloud services
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by elnaz asadi on Unsplash
on to other tools in the second part of this article, I'll show you how to manage your environment by managing user roles and access, monitoring system health, and viewing bills and costs. Getting Started
6%
Users speak on Kubernetes in business practice
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © alphaspirit, 123RF.com
with Kubernetes and what might be illusion? What mistakes can be avoided when implementing the technology? How much time must be scheduled and what resources need to be considered? What changes besides
6%
Modern Fortran – Part 2
15.12.2016
Home »  HPC  »  Articles  » 
are over i = 2,n − 1 and j = 2,n −1. Here is how you can write the iteration over the domain using array notation: a(2:n-1,2:n-1) = 0.25 * &     (a(1:n-2,2:n) + a(3:n,2:n) + a(2:n,1:n-2) + a(2:n,3:n

« Previous 1 ... 60 61 62 63 64 65 66 67 68 69 70 71 72 73 ... 95 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice