Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1020)
  • News (227)
  • Article (223)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 89 90 91 92 93 94 95 96 97 98 99 100 101 102 ... 148 Next »

13%
Ubuntu Desktop Remix
27.05.2013
Home »  Articles  » 
 
administrators with a foundation that they can customize for their own purposes. This explains why Canonical has mainly removed games, applications that connect to social networks, file-sharing tools, and a number
13%
CephX Encryption
27.03.2013
Home »  HPC  »  Articles  » 
to use RBD now instead of the old block devices, which means modifying the previous entry so that it ultimately looks like Listing 2. Listing 2: VM Storage as RBD network’ device
13%
Two-Factor Authentication
02.04.2013
Home »  Articles  » 
 
Standard (PCI DSS) – a binding regulatory framework for the processing of credit card payment transactions – calls for a two-factor authentication solution for network access by administrators, staff
13%
hwloc: Which Processor Is Running Your Service?
07.11.2011
Home »  HPC  »  Articles  » 
. The processors are, in turn, connected by a high-speed network (e.g., QPI on Intel-based servers and Hypertransport on AMD-based servers). The open source Portable Hardware Locality project [1], a sub
13%
Interview with Gregory Kurtzer, Developer of Singularity
21.04.2016
Home »  HPC  »  Articles  » 
non-authorized users gain root access on our production network, that is a breach of security. This means that we must narrow any exposure that Docker containers may have access to. While this is fairly
13%
Performance Health Check
13.06.2022
Home »  HPC  »  Articles  » 
are running, the amount of memory is correct, networking is up, and so on. I refer to this as the “state” of the node’s health. In that same article, I mentioned Node Health Check (NHC), which is used
13%
Configuring IPv6 in Windows with NetShell
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © James Steidl, 123RF.com
The Windows input template for the network interface is fine for a basic IPv6 configuration (Figure 1). You can define values such as the IPv6 address(es), prefix (typically "/64"), default gateway
13%
Interoperability across clouds
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © alenavlad, 123RF.com
for network function virtualization (NFV) and hybrid cloud orchestration. ARIA TOSCA is a manufacturer- and technology-independent TOSCA implementation. In addition to the command-line interface for template
13%
Insider Threats
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Seasons, 123RF.com
computing world out there – or inside your network. Users are not stupid or incompetent because they aren't trained to be awesome security Ninjas like you. They are users. It's your job to ensure
13%
Tinkerbell life-cycle management
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Bee Felten-Leidel on Unsplash
for production. A vendor you might not expect is now also getting into the mix, with Equinix launching its Tinkerbell tool. Primarily a provider of data center and network infrastructure, Equinix is looking

« Previous 1 ... 89 90 91 92 93 94 95 96 97 98 99 100 101 102 ... 148 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice