Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xsede%3 00s Llorente"5432 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (924)
  • Article (319)
  • News (100)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 63 64 65 66 67 68 69 70 71 72 73 74 75 76 ... 135 Next »

25%
Secure Kubernetes with Kubescape
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © limbi007, 123RF.com
to kubectl cluster-info works. Incidentally, kubectl should also exist on the host on which you later call kubescape. The K8s developers explain how to do this in their instructions [3]. In most cases
25%
Porting CUDA to HIP
15.11.2019
Home »  HPC  »  Articles  » 
by the CUDA language. Welcome to the world of HIP, the HPC-ready universal language at the core of AMD’s all-open ROCm platform [1]. You can use HIP to write code once and compile it for either the Nvidia
25%
Prolog and Epilog Scripts
07.07.2021
Home »  HPC  »  Articles  » 
and performance of the user’s workload, I don’t see a problem using it. Example 3: Setting Temporary I/O Directories Very close to the previous example is one that creates temporary directories for the user
25%
Tested: Autoconfiguring IPv6 clients
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Benis Arapovic, 123RF.com
, the MAC address (e.g., 00:11:22:33:44:55) is split down the middle, and two bytes containing FF:FE are inserted. This gives you 64 bits. If the basis is a globally unique address (which should be the case
25%
Secure Your Server with TCP Wrappers
02.10.2012
Home »  Articles  » 
 
addresses to connect /etc/hosts.allow , the file would simply look like this: sshd: 10.10.10.10, 1.2.3.4, 21.21.21.21 TCP Wrappers works nicely, even if you change the standard SSH port (it’s usually TCP
25%
Even benchmarks can be easy to handle
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
platforms. As you go through stress's options, you can visualize its effect on the system via Byobu's [3] status line, the Gnome System Monitor [4], the handy top [5], or Apple Activity Monitor on a Mac[6
25%
URL Tricks with htaccess
02.02.2012
Home »  Articles  » 
 
. As you can imagine, now that Apache’s feature set has grown significantly richer, you have a host of useful ways to use htaccess. More recently, htaccess has gained popularity as a conduit to mod
25%
When are Kubernetes and containers not a sensible solution?
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Kelly Sikkema on Unsplash
Containers, Kubernetes, Rancher, OpenShift, Docker, Podman – if you have not yet worked in depth with containers and Kubernetes (aka K8s), you might sometimes get the impression that you have
25%
High availability for RESTful services with OpenStack
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Ying Feng Johansson, 123RF.com
02 log 127.0.0.1 local0 03 maxconn 4000 04 daemon 05 uid 99 06 gid 99 07 08 defaults 09 log global 10 mode http 11 option httplog 12 option dontlognull 13 timeout server 5s
25%
Podman for Non-Root Docker
05.08.2024
Home »  HPC  »  Articles  » 
 months ago  28.5 kB quay.io/centos/centos          latest      300e315adb2f  3 years ago    217 MB testuser@laytonjb-MINI-S:~$ podman pull alpine Resolved "alpine" as

« Previous 1 ... 63 64 65 66 67 68 69 70 71 72 73 74 75 76 ... 135 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice