Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: bring calling -(liทe@248fvcen)-สูตรหวยออนไลน์.wco ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (879)
  • Article (252)
  • News (183)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 96 97 98 99 100 101 102 103 104 105 106 107 108 109 ... 132 Next »

15%
Finding and recording memory errors
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © lightwise, 123RF.com
difference. The upper number is just about one error per gigabit of memory per hour. The lower number indicates roughly one error every 1,000 years per gigabit of memory. A Linux kernel module called EDAC [4
15%
Manage logs with logrotate
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Vlad Kochelaevskiy, 123RF.com
rotate > /dev/null This is required, because rsyslog will continue to write to the file that first called it, which has since been rotated. So this command ensures that rsyslog writes to the current
15%
Software RAID in Windows, macOS, and Linux
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Photo by Mirko Blicke on Unsplash
. For the configuration, use the Disk Management tool, which you launch by calling diskmgmt.msc. For software RAID in Windows Server 2019, you can also use the resilient filesystem (ReFS). Creating and managing software
15%
An interview with SUSE CEO Nils Brauckmann
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Photos Courtesy of Swapnil Bhartiya
HPE," said Brauckmann. "We need a balance because as we grow our engineering teams to create more products, we also gain more customers. More customers mean more sales and service calls, so we have
15%
Creating a redundant array of inexpensive links
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Spectral, Fotolia.com
the software, which was programmed in Ruby (Figure 1). After launching, a daemon monitors your links and switches over when needed. When called with the generate_config option sudo fault
15%
Magnum: Exploring OpenStack's Container API
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Ulrich M ller, 123RF.com
the options they could hope for. If the use case calls for containers in more of a hypervisor context, the Nova interface is a good choice, but if Docker and containers are the focus, Magnum is definitely
15%
Set up and operate security monitoring throughout the enterprise
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Sergey Nivens, 123RF.com
defined in the correlation rules, the response described in the same rule is triggered – for example, notifying the responsible administrator by email, calling a script, or generating a new event that is
15%
FreeRADIUS for WiFi hotspots
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Tyler Olson, 123RF.com
need to modify the path for calling the program, for example, to /usr/bin/ntlm_auth and to match the domain (realm) of your ADS server. Usernames and passwords are provided directly by the requesting
15%
Using the ATA security features of modern hard disks and SSDs
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © braverabbit, 123RF.com
of resetting the security settings right from the outset. The initial master password is unknown to the user but can be overwritten by the first call of the SECURITY_SET_PASSWORD command, this time using
15%
Jelastic: Java and PHP as a service
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Melinda Nagy, 123RF.com
the services you use within the Jelastic cloud. Understanding Cloudlets The service is based on technology from Parallels [4], which calls appliances "containers" ("cloudlets" in Jelastic parlance), which

« Previous 1 ... 96 97 98 99 100 101 102 103 104 105 106 107 108 109 ... 132 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice