Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (887)
  • Article (212)
  • News (103)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 104 105 106 107 108 109 110 111 112 113 114 115 116 117 ... 121 Next »

9%
PC over IP
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
be used in conjunction with the software client. The connection between the client software and workstation host card is encrypted by default using SSL/TLS (AES 256-bit). Conclusions The use of remote
9%
Putting an Active Directory domain controller in the Azure cloud
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Sergey Nivens, 123RF.com
Services Vaults in Azure keep the whole thing safe. Data transmission is via HTTPS, and each vault is encrypted with AES 256. You will receive the key during the configuration, and if you lose it, you're out
9%
Anonymization and pseudonymization of data
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Debby Ledet on Unsplash
into a fixed character string by a hash function. This character string, also known as a hash, represents the original data but cannot be easily converted back. One common example of hashing is the SHA-256
9%
Warewulf 4 – Environment Modules
20.03.2023
Home »  HPC  »  Articles  » 
, gnu  has versions 8.5 and 12.2. The label after each compiler version (f) indicates that these are files. Figure 2 shows the path (in green) to the file when loading the gnu/8.5  module. After loading
9%
A GitOps continuous delivery tool for Kubernetes
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Tingey Injury Law Firm on Unsplash
. The ApplicationSet resource defines a template for the applications and a generator that produces the parameters for the template (Listing 12). Listing 12 Sample ApplicationSet apiVersion: argoproj
9%
Sovereign Cloud Stack – a genuine alternative for Europe
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © solerf, 123RF.com
Infrastructures (ALASCA) e.V. [12] standardization association. The association was initially only intended to provide a neutral home for the Yaook project but was then launched with the greater ambition
9%
A self-hosted server and site manager for WordPress
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © Marek Ulliasz, 123RF.com
perspective, most options have separate controls (Figure 12). Figure 12: You can lock down tabs for users accessing site details on the front end of the site
9%
Dockerizing Legacy Applications
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © hanohiki, 123RF.com
in Listing 12. Listing 12 docker-compose.yml Network Setup services: web: image: my-apache-image networks: - crm-network php: image: my-php-image networks: - crm
9%
An open source object storage solution
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Pat Whelen on Unsplash
the sequential read performance with the blockdev command. For example, to set a read-ahead value of 2048 (1MB) for the /dev/sdb1 device, use: blockdev --setra 2048 /dev/sdb1 For kernel parameters, you can
9%
Exploring the Xeon Phi
05.11.2013
Home »  Articles  » 
the number of cores. On average, a card from the 5100 series only has 35MB of RAM for each thread, compared with several hundred megabytes for each thread on current server systems. Because of the limited

« Previous 1 ... 104 105 106 107 108 109 110 111 112 113 114 115 116 117 ... 121 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice