Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (467)
  • News (194)
  • Article (80)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 66 67 68 69 70 71 72 73 74 75 Next »

15%
Script utilities in depth: grep, awk, and sed
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© jirkaejc, 123RF.com
some leading spaces, sed replaces that hash mark and a following t (either uppercase or lowercase), if present, with #p and adds an additional keyword following it: sed -i '/^ *#/s/#[ tT] */#p iop1
15%
Backup tools to save you time and money
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Melissa King, 123RF.com
directory), finding the right location for a given file can be a nightmare. Even if you are dealing with just a few systems, administration of the backups can become a burden. This leads into the question
15%
Create your own turnkey solutions
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Fandorina Liza, 123RF.com
Studio means depending on Novell's roadmap for the service – wherever that might take you. This is not to suggest that Novell's product roadmap will lead to Studio's being discontinued or anything like
15%
High availability clustering on a budget with KVM
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Yulia Saponova, 123RF.com
-robin approach or a master/slave model for the individual cards. To access the iSCSI server, you alternatively can use the Linux kernel device mapper's multipathing function. As with bonding, many roads lead
15%
Create a high availability VM with  DRBD9  and Reactor
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Emma Simpson on Unsplash
leads to comparable results. All of the components I looked at here are available free of charge online and work perfectly on Ubuntu 24.04. They are also published under a free license. A solution
15%
Predicting Drive Doom
20.10.2013
Home »  HPC  »  Articles  » 
intervals, so the drive could be in use when the test is run, which could lead to performance degradation. However, the smartctl man pages states: This type of test can, in principle, degrade the device
15%
Processor and Memory Metrics
12.02.2014
Home »  HPC  »  Articles  » 
, not general monitoring, although you can easily extend them past their default features into monitoring by writing your own code, which leads directly into my theme for this article: writing monitoring code
15%
Cross-Vendor IPsec
25.10.2011
Home »  Articles  » 
 
-based history of IPsec, different vendors implement their IPsec tools in different ways, leading to occasional complications when the two ends of the tunnel are using dissimilar implementations. I decided to try
15%
Working with the Lustre Filesystem
24.02.2022
Home »  HPC  »  Articles  » 
in production because it could potentially lead to security concerns and issues. Make note of the management server's IP address (Listing 6). This output will be the Lustre Networking (LNET) NID, which can
15%
Security data analytics and visualization with R
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Rancz Andrei, 123RF.com
is well made, and you can play with the data to your heart's content. Excel does offer charting options, but the flexibility of doing data analysis with R has lead me to transition more often to R. Chris

« Previous 1 ... 66 67 68 69 70 71 72 73 74 75 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice