Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: brain causing -(liทe@248fvcen)-สูตรหวยออนไลน์.wco ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1075)
  • Article (285)
  • News (93)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 100 101 102 103 104 105 106 107 108 109 110 111 112 113 ... 146 Next »

24%
iSCSI: Set up and use LIO targets
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Volodymyr Krasyuk, 123RF.com
, you can simulate a storage rack with a virtual machine by installing a suitable iSCSI target on the virtual machine's operating system. I will look at exactly that use case in this article
24%
A decentralized communication platform
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Mipan, Fotolia.com
Most messengers require central servers in the background, which means registering with your email address or phone number. This is not the case for the open source Jami. Much like Bit
24%
Redo Backup
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
). The main use case for Redo Backup is thus backing up to or restoring the following media types (Figure 2): Figure 1: The user interface of Redo Backup focuses
24%
Maintaining Android in the enterprise
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Iaroslav Neliubov, 123RF.com
require a high level of access to the Android device, and this discussion is intended for cases in which the phones belong to the company or the owner gives permission for significant modifications
24%
CrowdSec crowd security service
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Dan Burton on Unsplash
(IIS)-based web servers: cscli collections install crowdsecurity/iis Again, you need to edit a file – in this case, C:\ProgramData\CrowdSec\config\acquis.yaml: use_time_machine: true filenames: - C
24%
Finding Your Way Around a GPU-Accelerated Cloud Environment
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © Lucy Baldwin, 123RF.com
is stored in the service that you should be already using to monitor your cloud instances, making a case for convenience and integration. You can customize the granularity of the sampling by modifying
24%
ASCII-based monitoring tools
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © tele52, 123RF.com
. For example, in the CPU chart at the top, you can see CPU time information, as you would see in Top, as well as the top user and application (in this case, user laytonjb and the zenith application). You also
24%
A buyer's guide to NVMe-based storage
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Photo by Oscar Sutton on Unsplash
way. Some storage systems advertise NVMe support, without that necessarily being the case – at least not completely. Most all-flash arrays from established vendors have cache or Vault solid state drives
24%
Exchange Online migration with the Hybrid Agent
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © Natee Srisuk, 123RF.com
your on-premises Exchange instance and Exchange Online. During the installation, shortcuts are also created on the server; you can use them to restart the HCW in case of changes in your Exchange
24%
Common DevOps Mistakes
29.11.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © leeavison, 123RF.com
, this mistake is a more specific version of the previous topic, but it’s worth calling out separately because that’s not always the case. In the broadest terms, you have two collaborative workflows at the end

« Previous 1 ... 100 101 102 103 104 105 106 107 108 109 110 111 112 113 ... 146 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice