Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: brain causing -(liทe@248fvcen)-สูตรหวยออนไลน์.wco ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1075)
  • Article (285)
  • News (93)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 88 89 90 91 92 93 94 95 96 97 98 99 100 101 ... 146 Next »

24%
Automating with Expect Scripts
12.11.2012
Home »  Articles  » 
 
for you. In this case, ssh to a remote host (aspen ): spawn ssh aspen Change the host aspen to your remote host. When you SSH to a remote system, you’re prompted for a password. This password prompt
24%
Building Virtual Images with BoxGrinder and VMBuilder
07.01.2013
Home »  Articles  » 
 
In the simplest case, you can create the new virtual machine by a simple call to boxgrinder-build , where the only parameter you specify is the name of the appliance definition file: boxgrinder-build centos
24%
The Cloud’s Role in HPC
05.04.2013
Home »  HPC  »  Articles  » 
and is adapting to meet those workloads, in many cases using cloud computing to do so. Let me explain by giving two examples. 1. Massively Concurrent Runs I know an HPC center with users that periodically submit
24%
Access Anywhere with Mobile IPv6
16.04.2013
Home »  Articles  » 
a special case, because this option is sent in a destination header rather than in the mobility header. A destination header is an extension header that is only evaluated by the target. A new routing header
24%
Container and hardware e-virtualization under one roof
17.10.2011
Home »  CloudAge  »  Articles  » 
 
, KVM is free, and it became an official Linux kernel component in kernel version 2.6.20. KVM Inside As a kind of worst-case fallback, KVM can provide a slow but functional emulator for privileged
24%
hwloc: Which Processor Is Running Your Service?
07.11.2011
Home »  HPC  »  Articles  » 
this internal programming interface available through other languages. Embedding hwloc within Your Software In most cases, applications that use the hwloc C API can simply link against a system-installed hwloc
24%
Understanding Privilege Escalation
13.12.2011
Home »  Articles  » 
 
(and man commands to look up find parameters). In this case, since the initial user account has a low privilege level, most of find commands will generate Permission denied warnings. The redirection
24%
Web and Mail Servers with IPv6
13.12.2011
Home »  Articles  » 
 
, the situation is different if you work with virtual hosts. In this case, you need to look at the NameVirtualHost directive, which binds multiple virtual hosts to an IP address. The directive is suitable for IPv4
24%
Intruder Tools
13.12.2011
Home »  Articles  » 
 
-old case involving the Wichita, Kansas, BTK killer. Metadata is information about a document, such as who created a file, the date it was created, and when it was last modified. The amount of metadata
24%
DBaaS: EnterpriseDB – PostgreSQL in the Cloud
20.08.2012
Home »  CloudAge  »  Blogs  »  Dan Frost's Blog  » 
 
of an ongoing project I have, to understand why it’s worth bothering with SaaS at each level. Sure, there’s hype, but is it actually worth it? This time, it’s EnterpriseDB who are a slightly different case

« Previous 1 ... 88 89 90 91 92 93 94 95 96 97 98 99 100 101 ... 146 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice