Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (92)
  • Article (34)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 13 Next »

24%
Monitoring for small and medium-sized companies compared
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
or Active Directory-based authentication. Icinga can handle IPv6 – which legacy Nagios cannot. Icinga supports more than 20 languages and has many other benefits to offer. Nagios proudly points to its long
24%
Achieving More Harmonious Cloud Orchestration
01.04.2014
Home »  Articles  » 
bootstrapping of its own local cloud, which does not require access to a public cloud provider and thus imposes very few requirements. The Cloudify tarball is a heavyweight at 160MB, but the user initially only
24%
Resource Management with Slurm
05.11.2018
Home »  HPC  »  Articles  » 
 add account compute-account description="Compute accounts" \ Organization=OurOrg sacctmgr create user myuser account=compute-account adminlevel=None 6. Install Slurm on the compute nodes. Install/test MUNGE on the compute node: systemctl enable munge systemctl
24%
Resource Management with Slurm
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Vladislav Kochelaevs, fotolia.com
remember using it at Linux Networx in the early 2000s. Over the years, it has been developed by Lawrence Livermore National Laboratory, SchedMD [5], Linux Networx, Hewlett-Packard, and Groupe Bull [6
24%
Checking password complexity with John the Ripper
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1MB) and simple ... 6
24%
Measuring the performance health of system nodes
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Peter Hermes Furian, 123RF.com
have created. Probably the most predominant version is NPB-GPU [6], which uses the CUDA parallel computing platform and programming model to produce the GPU versions of the five kernels and three pseudo
24%
Demystified: The facts about green IT
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Iakov Kalinin, 123RF
with the total sums for the value of IT equipment lying between a few thousand Euros (sole proprietorship) and about 6 million Euros (large corporation). The total period of the study was divided into segments
24%
Creating KVM machines with BoxGrinder and VMBuilder
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© yewkeo, 123RF.com
can run the virt-clone command in the shell: virt-clone --original userver5 \ --name userver6 --file \ /var/lib/libvirt/images/userver6.img virt-clone creates a new XML definition file
24%
Retrieving Windows performance data in PowerShell
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © andresr, fotolia.com
Number: 00282-30340-00000-AB9A5 Version: 6.3.9600 The information you read from the operating system can also be formatted and customized. For example, normally only the operating system's most
24%
Performance Health Check
13.06.2022
Home »  HPC  »  Articles  » 
) BT (4 cores) 11.95 66.5 272 CG (4 cores) 0.4 23.9 62.3 EP (6 cores) 1.4 5.46 21.05 FT (4 cores) 1

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 13 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice