Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: kind Man high line mind(711bmw.com)kind Man high line mind(711bmw.com)w3c ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (339)
  • Article (86)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

1 2 3 4 5 6 7 ... 43 Next »

100%
Accessing Fortran code with Python
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Kheng Ho Toh, , 123RF.com
-Performance Python – Compiled Code and C Interface" by Jeff Layton: http://www.admin-magazine.com/HPC/Articles/High-Performance-Python f2py: http://cens.ioc.ee/~pearu/ f2py users guide: https ... High-Performance Python
94%
Command-line tools for the HPC administrator
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Vasyl Nesterov, 123RF.com
whereis command, which tells you whether a command is in $PATH and where it is located. For example, when I looked for perl (Figure 3), the output told me where the man pages were located, as well ... Several sophisticated command-line tools can help you manage and troubleshoot HPC (or other) systems. ... Command-line tools for the HPC administrator ... Line Items
85%
Network performance in-terminal graphics  tools
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Lucy Baldwin, 123RF.com
(-l) starts off with a continuously updating single line providing network traffic statistics for the monitored interface: $ vnstat -l Monitoring eth0... (press CTRL-C to stop) rx: 108 kbit ... Line Chatter
80%
Supercharge your software upgrade routine
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Photo by redcharlie on Unsplash
: curl git pkg-config 0 upgraded, 3 newly installed, 0 to remove and 1 not upgraded. Need to get 3,409 kB of archives. After this operation, 19.5 MB of additional disk space will be used. Get:1 http://gb.archive.ubuntu.com ... Top of the Line
79%
Favorite benchmarking tools
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © Lucy Baldwin, 123RF.com
and write counts), and page faults, both minor (MMU) and major (disk access). Table 1 Format Specifiers* Option Function C Image name and command-line arguments (argv ... High Definition
78%
High-Performance Python 2
22.08.2019
Home »  HPC  »  Articles  » 
Soon after C became the first language to be callable from Python, people wanted the same for the millions of lines of proven Fortran code in scientific applications. In the past, combining C ... High-Performance Python 2 ... High-Performance Python – Compiled Code and Fortran Interface
72%
Highly available storage virtualization
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Les Cunliffe, 123RF.com
, which is a useful approach for coping with massive data growth. In this article, I provide an overview of basic technologies and explain how to implement highly available storage area network (SAN ... Implementing highly available SAN data storage virtualization. ... Highly available storage virtualization
67%
Detecting and analyzing man-in-the-middle attacks
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Soner Eker on Unsplash
an MITM attack yourself. Always keep in mind that this kind of experiment on a third-party network – including public WiFi – is likely to be punishable by law. On your own network, however, the security ... Detecting and analyzing man-in-the-middle attacks
65%
Protect privileged accounts in AD
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Lead Image © ginasanders, 123RF.com
authentication include klist [2] and whoami [3] – specifically, whoami /claims in this case. When troubleshooting, always keep in mind that authentication policies, as the name suggests, control authentication ... Granular protection for highly privileged accounts is granted by the Protected Users group in Active Directory and Kerberos authentication policies. ... Highly Confidential
58%
Create a high availability VM with  DRBD9  and Reactor
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Emma Simpson on Unsplash
). Figure 2: The virt-install command lets you install a virtual instance at the command line. Linbit virter is one possible alternative. © Debian Handbook, CC BY-SA 3.0 [11] It makes sense to select ... DRBD9 and DRBD Reactor create a Linux high-availability stack for virtual instances with replicated storage comparable to the classic Corosync and Pacemaker solution. ... Create a high availability VM with  DRBD9  and Reactor

1 2 3 4 5 6 7 ... 43 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice