Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1047)
  • Article (333)
  • News (119)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 88 89 90 91 92 93 94 95 96 97 98 99 100 101 ... 151 Next »

16%
Evaluating logfiles with Microsoft Log Parser Studio
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Thomas Lammeyer, Fotolia.com
from systems such as the IIS, Microsoft Exchange ActiveSync, Exchange Web Services (EWS), or Outlook Web Access (OWA). Installation under .NET .NET Framework 4.x and Log Parser 2.2 [2] form the basis
16%
Secure Kubernetes with Kubescape
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © limbi007, 123RF.com
to kubectl cluster-info works. Incidentally, kubectl should also exist on the host on which you later call kubescape. The K8s developers explain how to do this in their instructions [3]. In most cases
16%
How Old is That Data?
20.04.2017
Home »  HPC  »  Articles  » 
to understand what’s going on with your storage, even on your desktop or laptop. Studies of Data Age A few years ago, a study from the University of California, Santa Cruz, and NetApp examined CIFS storage
16%
Azure Application Gateway load distribution tool
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © foodandmore, 123RF.com
that offers security functions (e.g., protection against distributed denial-of-service (DDoS) attacks). To see how AAG works, refer to Figure 1 for the individual components. The front-end IP is, as the name
16%
Using the Expect scripting environment
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Ivan Mikhaylov, 123RF.com
or a password, and the current user will be allowed to run remote commands as root using ssh. This script is called ec2_ssh_init, and Listing 3 shows its initial section. Listing 3 ec2_ssh_init (Part
16%
Porting CUDA to HIP
15.11.2019
Home »  HPC  »  Articles  » 
by the CUDA language. Welcome to the world of HIP, the HPC-ready universal language at the core of AMD’s all-open ROCm platform [1]. You can use HIP to write code once and compile it for either the Nvidia
16%
Prolog and Epilog Scripts
07.07.2021
Home »  HPC  »  Articles  » 
and performance of the user’s workload, I don’t see a problem using it. Example 3: Setting Temporary I/O Directories Very close to the previous example is one that creates temporary directories for the user
16%
Managing Linux systems with Spacewalk
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © NASA
, $user, $pass) = (split); 17 close(IN); 18 19 my $client = new Frontier::Client(url => "http://$server/rpc/api"); 20 my $session = $client->call('auth.login', $user, $pass); 21 22 return ($client
16%
Even benchmarks can be easy to handle
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
platforms. As you go through stress's options, you can visualize its effect on the system via Byobu's [3] status line, the Gnome System Monitor [4], the handy top [5], or Apple Activity Monitor on a Mac[6
16%
URL Tricks with htaccess
02.02.2012
Home »  Articles  » 
 
. As you can imagine, now that Apache’s feature set has grown significantly richer, you have a host of useful ways to use htaccess. More recently, htaccess has gained popularity as a conduit to mod

« Previous 1 ... 88 89 90 91 92 93 94 95 96 97 98 99 100 101 ... 151 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice