Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %25x20mm%2222%21490 Llorente%2012 ?

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (78)
  • Article (2)
Keywords

« Previous 1 2 3 4 5 6 7 8

44%
The RADOS object store and Ceph filesystem
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Brigida Soriano, Fotolia.com
= bob 24 [osd.2] 25 host = charlie 26 [mds.a] 27 host = alice Most importantly, the nodes in the RADOS cluster must reach one another directly using the hostnames from your ceph.conf file
44%
More than password protection, htaccess has you covered
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Dmitry Bruskov, 123RF.com
access to get permission to read the password file, rather than being easily found by surfing through web-accessible directory structures (Figure 2). Figure
44%
Backup tools to save you time and money
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Melissa King, 123RF.com
machines. Moving an external hard disk between two machines might be easiest, but with 20 machines, you should definitely consider a centralized system. Here, too, you must consider the speed at which you
44%
ASM tools and strategies for threat management
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © tarokichi, 123RF.com
in particular – to identify their attack surfaces more precisely and respond more quickly to changes in their risk situation (see the "Prevention and NIS2" box). In their Leadership Compass publications on ASM [1
44%
Intelligent observability with AI and Coroot
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by Gustavo Xavier on Unsplash
automatic pattern-based prevention of malicious activities on the Internet. SpamAssassin [2] and Rspamd [3], to name just two examples, rely on heuristic methods to analyze various factors under the hood
43%
SC24 – Bursting at the Seams
07.01.2025
Home »  HPC  »  Articles  » 
on the June 2020 list at 13,400 TFLOPS. The previous system, Summit, achieved only 2,925.75 TFLOPS. Fugaku’s results went up a little on the next list (November 2020), at almost 5.5 times faster than Summit
43%
Supercomputing Conference 2024
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © djem, 123RF.com
, Michael, and Doug. They, and others, are the unsung heroes putting this party together. SCinet and Power One thing I learned this year is that SCinet [2], which was used for Internet access during
43%
Bare metal lifecycle management with six open source tools
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Beth Macdonald on Unsplash
for NetBox or other common IPAM tools. In general, you can see that Foreman fully embraces its role in an IT setup as a "single source of infrastructure truth" [2] and does not tolerate additional tools
43%
Comparing system rescue distros
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Lead Image © Kirill Makarov, 123RF.com
't doing too much at the moment either, although version 9.1 from January 2021 is still available [1] and was featured in the June 2021 Linux Magazine [2]. Developer Klaus Knopper is now very busy
43%
File access optimization discovery and visualization
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by Barnabas Davoti on Unsplash
://github.com/hpcraink/fsprj2, https://www.admin-magazine.com/Archive/2022/71/A-ptrace-based-tracing-mechanism-for-syscalls POSIX: https://pubs.opengroup.org/onlinepubs/9699919799 MPI: https://www.mpi-forum.org Script

« Previous 1 2 3 4 5 6 7 8

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice