Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: "0mbén Llorente%2222 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1176)
  • Article (302)
  • News (174)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 85 86 87 88 89 90 91 92 93 94 95 96 97 98 ... 166 Next »

28%
Create a high availability VM with  DRBD9  and Reactor
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Emma Simpson on Unsplash
; after-sb-0pri discard-zero-changes; after-sb-1pri discard-secondary; after-sb-2pri disconnect; } } If the Ubuntu systems are rolled out with an active firewall, such as UFW, the specified
28%
Live Migration
18.02.2014
Home »  Articles  » 
filesystems like OCFS2 and GFS2 are necessary. VM live migration is easier to set up on a distributed replicated block device (DRBD) cluster basis. DRBD basically provides the option of using an existing
28%
Red Hat’s Cloud Tools
08.07.2013
Home »  Articles  » 
 
-party cloud technologies with the help of its Delta Cloud API. After all, CloudForms 1.1, DeltaCloud 1.0, Storage Server 2.0, JBoss Middleware, and Enterprise Virtualization 3.1 form the foundation
28%
Wireshark
27.11.2011
Home »  Articles  » 
 
for the required fields. The main feature of the new version is support for more than 30 new protocols including JSON, Wi-Fi P2P (Wi-Fi Direct), and Fibre Channel over InfiniBand. Also, Wireshark 1.6.0 can export
28%
Saving Storage Space with Reduced Precision
19.06.2023
Home »  HPC  »  Articles  » 
a = 100.0*np.random.random((N,N)) a.astype(np.float64) print("a[5,5] = ",a[5,5]," type = ",a[5,5].dtype) np.save('double', a) b = np.copy(a) b = b.astype(np.float32) print("b[5,5] = ",b[5,5]," type = ",b[5
28%
Improved defense through pen testing
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image Photo by Simeon Jacobson on Unsplash
. In Figure 9, the user has opened an unauthenticated Bash shell that the attacker exploits in Figure 10. The IP address of this system is 10.0.2.20. This particular script could easily be executed within
28%
Layer 3 SDN
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Kirsty Pargeter, 123RF.com
, Calico supports both OpenStack … © OpenStack, Apache-2.0 [2] Figure 2: … and Kubernetes, plus several other solutions. © Kubernetes, CC BY 4.0 [3
28%
Kubernetes clusters within AWS EKS
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © Zlatko Guzmic, 123RF.com
Service (AKS) [2], and Amazon Elastic Kubernetes Service (EKS) [3]. In this article, I walk through the automated deployment of the Amazon Elastic Kubernetes Service (EKS), a mature and battle
28%
Network overlay with VXLAN
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Fikri Rasyid on Unsplash
despite different locations and a Layer 3 underlay. An example of VXLAN as an overlay could be a virtual server system that is redundant and uses the virtual IPv4 address 192.0.2.1. The address
28%
Manage Windows Server storage with PowerShell
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Brian McGowan on Unsplash
this configuration step as early as possible: Add-WindowsFeature Multipath-IO $vid = 'MSFT2005' $pid = 'iSCSIBusType_0x9' New-MSDSMSupportedHW -VendorId $vid -ProductId $pid Set

« Previous 1 ... 85 86 87 88 89 90 91 92 93 94 95 96 97 98 ... 166 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice