Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1339)
  • Article (364)
  • News (273)
  • Blog post (9)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 73 74 75 76 77 78 79 80 81 82 83 84 85 86 ... 199 Next »

8%
Failure to Scale
03.07.2013
Home »  HPC  »  Articles  » 
to 64. Figure 2 plots the resulting wall clock time on the y -axis versus the number of processes. Figure 2: Example application and the influence
8%
Virtual Desktop
25.08.2011
Home »  Articles  » 
 
to think of VDI solutions as “generation 1” and “generation 2.” Generation 1 was about hosting virtual desktops on servers and delivering the user experience to connected clients via some display protocol
8%
Neglected IPv6 Features
06.08.2012
Home »  Articles  » 
 
link. By sending an initial router solicitation (Figure 2) to the link-local multicast address FF02::2 , hosts try to obtain IPv6 prefixes that are valid throughout the enterprise or worldwide
8%
REMORA
18.09.2017
Home »  HPC  »  Articles  » 
MPIs). I built Remora with the command, REMORA_INSTALL_PREFIX=/home/laytonjb/bin/remora-1.8.2 ./install.sh which installs to a directory in my home account. If more than one user is to have access, you
8%
Malware Analysis
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © raptorcaptor, 123RF.com
In a previous article [1], I described how to obtain a memory image from a Windows computer that would allow forensic analysis. I briefly discussed using F-Response TACTICAL [2] to get the memory
8%
Goodbye virtual machines, hello container machines
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Erik Odiin on Unsplash
that could stretch your test system a bit farther is Footloose, a tool that provides "containers that look like VMs" [1]. Footloose [2], which is built around Docker, runs systemd as PID 1 and uses ssh daemon
8%
Goodbye cloud VMs, hello laptop VMs
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © Liubomyr Feshchyn, 123rf.com
." You can have your cake and eat it too with Multipass [2]! The tooling provided in this article is for newer machines that have virtualization capability provided by the processor. Still, the container
8%
Cloud-native storage with OpenEBS
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
to deal with the specifics of a container landscape. Examples of these cloud-native storage approaches include Rook [1], Portworx, StorageOS, and OpenEBS [2], which I take a closer look at in this article
8%
Innovations in PowerShell 5
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Zarko Cvijovic, 123RF.com
, with each new PowerShell version comes a design highlight. In the current PowerShell on Windows  8.1 and Server  2012  R2, this was the "Desired State Configuration" (DSC), which was designed to make other
8%
Using the ATA security features of modern hard disks and SSDs
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © braverabbit, 123RF.com
Model Number: INTEL SSDSC2CW240A3 Serial Number: XXXXXXXXXXXXXXXXXX Firmware Revision: 400i Transport: Serial, ATA8-AST, SATA 1.0a, SATA II [...] Commands

« Previous 1 ... 73 74 75 76 77 78 79 80 81 82 83 84 85 86 ... 199 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice