Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: "0mbén Llorente%2222 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (943)
  • Article (298)
  • News (167)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 71 72 73 74 75 76 77 78 79 80 81 82 83 84 ... 142 Next »

29%
Live Migration
18.02.2014
Home »  Articles  » 
filesystems like OCFS2 and GFS2 are necessary. VM live migration is easier to set up on a distributed replicated block device (DRBD) cluster basis. DRBD basically provides the option of using an existing
29%
Red Hat’s Cloud Tools
08.07.2013
Home »  Articles  » 
 
-party cloud technologies with the help of its Delta Cloud API. After all, CloudForms 1.1, DeltaCloud 1.0, Storage Server 2.0, JBoss Middleware, and Enterprise Virtualization 3.1 form the foundation
29%
Wireshark
27.11.2011
Home »  Articles  » 
 
for the required fields. The main feature of the new version is support for more than 30 new protocols including JSON, Wi-Fi P2P (Wi-Fi Direct), and Fibre Channel over InfiniBand. Also, Wireshark 1.6.0 can export
29%
Saving Storage Space with Reduced Precision
19.06.2023
Home »  HPC  »  Articles  » 
a = 100.0*np.random.random((N,N)) a.astype(np.float64) print("a[5,5] = ",a[5,5]," type = ",a[5,5].dtype) np.save('double', a) b = np.copy(a) b = b.astype(np.float32) print("b[5,5] = ",b[5,5]," type = ",b[5
29%
Improved defense through pen testing
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image Photo by Simeon Jacobson on Unsplash
. In Figure 9, the user has opened an unauthenticated Bash shell that the attacker exploits in Figure 10. The IP address of this system is 10.0.2.20. This particular script could easily be executed within
29%
Layer 3 SDN
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Kirsty Pargeter, 123RF.com
, Calico supports both OpenStack … © OpenStack, Apache-2.0 [2] Figure 2: … and Kubernetes, plus several other solutions. © Kubernetes, CC BY 4.0 [3
29%
Kubernetes clusters within AWS EKS
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © Zlatko Guzmic, 123RF.com
Service (AKS) [2], and Amazon Elastic Kubernetes Service (EKS) [3]. In this article, I walk through the automated deployment of the Amazon Elastic Kubernetes Service (EKS), a mature and battle
29%
Network overlay with VXLAN
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Fikri Rasyid on Unsplash
despite different locations and a Layer 3 underlay. An example of VXLAN as an overlay could be a virtual server system that is redundant and uses the virtual IPv4 address 192.0.2.1. The address
29%
Manage Windows Server storage with PowerShell
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Brian McGowan on Unsplash
this configuration step as early as possible: Add-WindowsFeature Multipath-IO $vid = 'MSFT2005' $pid = 'iSCSIBusType_0x9' New-MSDSMSupportedHW -VendorId $vid -ProductId $pid Set
29%
Optimizing Windows 10 for SSDs
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Sergiy Serdyuk, 123RF.com
.15(Seq-write_rate)+0.1(Seq-read_rate)+2(4k-read_rate)+4k-write_rate+4-64thrd-write_rate+1.5(4-64thrd-read_rate) Read result = 0.1(Seq-read_rate)+4k_read_rate+4_64thrd_read_rate Write result = 0.1(Seq

« Previous 1 ... 71 72 73 74 75 76 77 78 79 80 81 82 83 84 ... 142 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice