Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (782)
  • Article (248)
  • News (27)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 96 97 98 99 100 101 102 103 104 105 106 Next »

16%
Deploying OpenStack in the cloud and the data center
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © johnjohnson, 123RF.com
, the choices were Ubuntu's metal as a service (generically, MaaS, but MAAS when referring to Ubuntu's implementation) [2], Juju [3], and Autopilot [4]. With this tool mix, even newcomers can quickly establish
16%
Using the Expect scripting environment
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Ivan Mikhaylov, 123RF.com
to connect to the remote host with ssh. (6) expect – Wait for "(yes/no)? " in the output. This is the end of the several-line output about host key exchange. (7) send – Send the string "yes" plus
16%
Discovering indicators of compromise
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Jakob Owens on Unsplash
to identify an essential principle of the security analyst: As an attack occurs, certain things are left behind. This concept was first articulated by Edmond Locard [3] almost 100 years ago, well before
16%
Create a high availability VM with  DRBD9  and Reactor
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Emma Simpson on Unsplash
to this component as Horrorsync. Corosync was later split up again. Whereas Corosync now primarily handles the exchange of data between the different systems in a cluster, Kronosnet [3] ensures that the information
16%
Dockerizing Legacy Applications
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © hanohiki, 123RF.com
--version Now that you have Docker installed, you'll also need Docker Compose, a tool for defining and running multi-container Docker applications [3]. If you have Docker Desktop installed, you won't need
16%
Tracking down problems with Jaeger
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Sebastian Molina fotografÌa on Unsplash
on HTTP(S) are widely used today. Solutions such as a high-performance Remote Procedure Call (e.g., gRPC) framework also play a role. What they have in common is that they do not rely exclusively
16%
The state of OpenStack in 2022
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by vadim kaipov on Unsplash
languages and theming in a far better way. Canonical and Red Hat placed great emphasis on this dashboard: After all, Canonical Ubuntu wants to impress in orange (Figure 3), whereas Red Hat OpenStack accents
16%
Clusters with Windows Server 2012 R2
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Jakub Gojda, 123RF.com
an existing target. After generating the individual virtual disks and assigning iSCSI target(s), you can connect them to the cluster nodes. After integration, the virtual disks are displayed as normal drives
16%
A GitOps continuous delivery tool for Kubernetes
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Tingey Injury Law Firm on Unsplash
with Kubernetes (sometimes called K8s). If you are not using K8s, it makes little sense to consider Argo CD, at least at present. Second, you need to invest considerable time in learning the new environment
16%
Code IaC for provisioning of preconfigured virtual environments
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © vladnikon, 123RF.com
properties include the sku, which controls resource specifications such as capacity, VM series (e.g., Standard_D4s_v3), size, and tier (e.g., standard or premium). Other key properties are hibernate

« Previous 1 ... 96 97 98 99 100 101 102 103 104 105 106 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice