Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1029)
  • News (227)
  • Article (224)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 93 94 95 96 97 98 99 100 101 102 103 104 105 106 ... 149 Next »

13%
Extending OpenNebula with hooks
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Greg Epperson, Photocase.com
of virtual machines, and industrial customers include Telefonica and Akamai. The main developer from C12G Labs offers commercial support and is currently establishing an international network of partners [6
13%
The IT Dilemma – A Serious Lack of Vision
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
. They are the ones who take the hills. They are the ones who engage the enemy. In IT, the generals are the CxOs, and the stripes are the network engineers, the security staff, the hardware support teams
13%
The best cmdlets for PowerShell
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Rossella Apostoli, 123RF.com
-WindowsFeature Server-Gui-Mgmt-Infra You can also connect from a computer on the network using Server Manager. Alternatively, you can use the PowerShell commands: Import-Module Dism Enable
13%
Ralph, the open asset management tool
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Sebastian Duda, 123RF.com
Networks are dynamic entities that change quickly depending on the company and field of application. Often only individual systems are added, at other times whole departments are equipped with new
13%
Soft Skills
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © marigranula, 123RF.com
problem ails them and then get back to our network scans and to our now tepid Diet Dr. Peppers. Unfortunately, life involves other people, and the most successful technical people (the ones you hate
13%
Five HPC Pitfalls (Part 1)
13.03.2012
Home »  HPC  »  Articles  » 
of a Network Area Storage (NAS) appliance. Each appliance will adhere to the NFS protocol, but poor performance can greatly limit the true potential of a cluster. A similar situation exists for network
13%
Stopping Side Channel Attacks
16.10.2012
Home »  Articles  » 
 
, the network components, or any active applications. The study might also include file paths to confidential data or configuration files. Of course, the security of encryption and cryptographic signatures
13%
Interview: Hardware or Cloudware?
10.04.2012
Home »  HPC  »  Articles  » 
to seamlessly create the illusion that there was just one computer. And that went through multiple iterations – in the ’70s with distributed computing, in the ’80s with network computing, in the ’90s with network
13%
AMD’s Greg Stoner on ROCm
31.10.2017
Home »  HPC  »  Articles  » 
-learning library, which supports GPU acceleration for deep convolution networks. We’re in the process of porting several machine-learning libraries and tools. Many of these tools were written with CUDA, and we can
13%
Trivy security scanner
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Lead Image © MPower, photocase.com
.zones 27 network = data.terraform_remote_state.vpc.outputs.network_name 28 subnetwork = data.terraform_remote_state.vpc.outputs.subnets_names[0] 29 ip

« Previous 1 ... 93 94 95 96 97 98 99 100 101 102 103 104 105 106 ... 149 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice