Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1272)
  • News (233)
  • Article (229)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 106 107 108 109 110 111 112 113 114 115 116 117 118 119 ... 174 Next »

12%
CephX Encryption
27.03.2013
Home »  HPC  »  Articles  » 
to use RBD now instead of the old block devices, which means modifying the previous entry so that it ultimately looks like Listing 2. Listing 2: VM Storage as RBD network’ device
12%
Two-Factor Authentication
02.04.2013
Home »  Articles  » 
 
Standard (PCI DSS) – a binding regulatory framework for the processing of credit card payment transactions – calls for a two-factor authentication solution for network access by administrators, staff
12%
hwloc: Which Processor Is Running Your Service?
07.11.2011
Home »  HPC  »  Articles  » 
. The processors are, in turn, connected by a high-speed network (e.g., QPI on Intel-based servers and Hypertransport on AMD-based servers). The open source Portable Hardware Locality project [1], a sub
12%
Interview with Gregory Kurtzer, Developer of Singularity
21.04.2016
Home »  HPC  »  Articles  » 
non-authorized users gain root access on our production network, that is a breach of security. This means that we must narrow any exposure that Docker containers may have access to. While this is fairly
12%
Performance Health Check
13.06.2022
Home »  HPC  »  Articles  » 
are running, the amount of memory is correct, networking is up, and so on. I refer to this as the “state” of the node’s health. In that same article, I mentioned Node Health Check (NHC), which is used
12%
Configuring IPv6 in Windows with NetShell
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © James Steidl, 123RF.com
The Windows input template for the network interface is fine for a basic IPv6 configuration (Figure 1). You can define values such as the IPv6 address(es), prefix (typically "/64"), default gateway
12%
Interoperability across clouds
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © alenavlad, 123RF.com
for network function virtualization (NFV) and hybrid cloud orchestration. ARIA TOSCA is a manufacturer- and technology-independent TOSCA implementation. In addition to the command-line interface for template
12%
Insider Threats
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Seasons, 123RF.com
computing world out there – or inside your network. Users are not stupid or incompetent because they aren't trained to be awesome security Ninjas like you. They are users. It's your job to ensure
12%
Tinkerbell life-cycle management
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Bee Felten-Leidel on Unsplash
for production. A vendor you might not expect is now also getting into the mix, with Equinix launching its Tinkerbell tool. Primarily a provider of data center and network infrastructure, Equinix is looking
12%
Rancher manages lean Kubernetes workloads
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © Sebastian Duda, 123RF.com
to be correct on every system of the installation and can be implemented within the distributions either by the legacy network time protocol (NTP) or with chronyd. Either way, one of the two components needs

« Previous 1 ... 106 107 108 109 110 111 112 113 114 115 116 117 118 119 ... 174 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice