Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 通讯录的微信怎么查-(⏭查询网站gpios.com⏮)-可以查手机通讯录吗-别人欠款如何查通讯录-催款人怎么查通讯录-(⏭查询网站gpios.com⏮)-如何查手机一年前的通讯录6Q ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1166)
  • Article (82)
  • News (13)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 99 100 101 102 103 104 105 106 107 108 109 110 111 112 ... 127 Next »

72%
Automated orchestration of a horizontally scalable build pipeline
15.02.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
© Kittipong Jirasukhanont, 123RF
-Based Deployment - name: add correct apt repo   become: yes   apt_repository:     repo: deb [arch=amd64] https://download.docker.com/linux/ubuntu {{lsb_release_output.stdout}} stable     state: present
72%
Storage cluster management with LINSTOR
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © sdecoret, 123RF.com
if the original resource from which they were created is deleted. In the LINSTOR object hierarchy, snapshots are linked to the resource definition (Figure 4). Therefore, you cannot delete them until you remove all
72%
OS10 and Dell's open networking offensive
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Pei Ling Hoo, 123RF.com
in cases where, for example, clouds are distributed across multiple locations and rely on different local networks: Thanks to L3 routing, such constructs no longer need a centralized router (Figure 4
72%
Analyzing tricky database problems
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Photo by Quino Al on Unsplash
, six MariaDB servers [2] are used in Galera Cluster [3], and hosting is handled by nine Apache servers (four each for sync and web and one for management). Switch uses Redis [4] as its key-value store
72%
Distributed denial of service attacks from and against the cloud
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © leksustuss, 123RF.com
did not see any disruptions in their service. Also in March, the German Finanzwelt portal was only partially accessible [4] for several days because of a DDoS attack, and last fall, the infrastructure
72%
Replication between SQL Server and Azure SQL
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © Charles Gibson, 123RF.com
in the tables if required (Figure 4). Figure 4: Selecting the tables to be replicated for Azure SQL is easy. The Snapshot Agent plays a central role
72%
Migrating to Azure Monitor Agent
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Agent and associate them to a Data Collection Rule policy initiative (Figure 4). You need to assign this policy to the desired scope. In production environments, that would be your Azure subscription
72%
VMware vRealize Automation 7
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © Dmitriy Shpilko, 123RF.com
vRealize Automation 7 Details Feature Information Product Software for managing and provisioning cloud infrastructures. Manufacturer VMWare (www.vmware.com
72%
Kick-start your AI projects with Kubeflow
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © austler, 123RF.com
the hosted domain there and clicking Hosted zones | View details . The required information can be found in the Hosted zone ID field (Figure 4). Figure 4
72%
Search for domain controller vulnerabilities
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © varijanta, 123RF.com
pauses the scan, and you can cancel a scan completely, as well. Evaluating the Scan Results After clicking on a running or completed scan, Nessus displays the number of vulnerabilities it found (Figure 4

« Previous 1 ... 99 100 101 102 103 104 105 106 107 108 109 110 111 112 ... 127 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice