Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (735)
  • Article (234)
  • Blog post (6)
  • News (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 79 80 81 82 83 84 85 86 87 88 89 90 91 92 ... 98 Next »

7%
Users speak on Kubernetes in business practice
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © alphaspirit, 123RF.com
with the traffic. It passed its baptism of fire during the Spanish general election in 2019, where it presented the latest election results in real time to hundreds of thousands of Spanish citizens. "If we had
7%
Discovering SQL injection vulnerabilities
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Mika Specta, 123RF.com
Within a couple of hours, an experienced Internet attack specialist can bring your server infrastructure to its knees. In many cases, the barn door through which the attackers gain entry
7%
Serverless computing with AWS Lambda
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © joingate, 123RF.com
such as AWS Lambda. For example, when you create a Lambda function (source code and a run-time configuration) and execute it, the AWS platform only bills you for the execution time, also called the "compute
7%
Protect Hyper-V with on-board resources
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Craig Whitehead on Unsplash
, it is recommended that you use the Core installation of Windows Server 2019 or newer for Hyper-V hosts, which will help you prevent attacks on the desktop and the programs installed on it. Bear in mind
7%
Understanding Layer 2 switch port security
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Taffi, Fotolia.com
the destination address in its MAC address table. The destination is found, and the data frame is sent out through port 8. When a network contains two or more switches, each switch maintains its own MAC ... What happens when an intruder with a laptop parks at an empty cubicle and attaches to your local network? If you don't want to find out, it might be time to think about implementing some switch port
7%
Optimizing Windows 10 for SSDs
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Sergiy Serdyuk, 123RF.com
to the driver for the controller and invoke its properties. 3. Switch to the Driver tab. 4. Click on Driver Details . 5. Load the driver with "ahci" in its name
7%
Quick UDP Internet connections
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Jonathan Chng on Unsplash
based. For example, the third version of the Hypertext Transport Protocol (HTTP/3) uses QUIC. The first drafts of the Session Initiation Protocol (SIP) successor Real-Time Internet Peering for Telephony
7%
Spam protection using SpamAssassin
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Konstantin Inozemtcev, 123RF.com
Generator: http://www.yrex.com/spam/spamconfig.php/ File to measure standard processing time: http://svn.apache.org/repos/asf/spamassassin/trunk/masses/plugins/HitFreqsRuleTiming.pm/ Writing rules
7%
A Distributed SQL Database
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Sonika Agarwal on Unsplash
table. By default, CockroachDB replicates each range of data three times. You can verify this by running the query SHOW EXPERIMENTAL_REPLICA CONFIG FOR TABLE books; Now, simulate a network partition
7%
Building a HPC cluster with Warewulf 4
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Andrew Ly on Unsplash
to each other, or to a standard atomic clock (or close to it), or both. With clocks in sync, the many tools and libraries on clusters such as MPI will function correctly. On Rocky Linux 8, I use chrony [2 ... Warewulf installed with a compute node is not really an HPC cluster; you need to ensure precise time keeping and add a resource manager. ... Time and Resource Management

« Previous 1 ... 79 80 81 82 83 84 85 86 87 88 89 90 91 92 ... 98 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice