Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xsede%3 00s Llorente"52 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (948)
  • Article (319)
  • News (103)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 106 107 108 109 110 111 112 113 114 115 116 117 118 119 ... 138 Next »

17%
Exploring Kubernetes with Minikube
11.09.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
to Virtualization.'' Alternatives to Virtualization According to one very nicely written page [3], KVM will still work without the hardware extensions, but it will be much slower. It is also possible
17%
Cloud-native storage for Kubernetes with Rook
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © efks, 123RF.com
. Also, the Ceph Object Gateway or RADOS Gateway (Figure 2) enables an interface to Ceph on the basis of RESTful Swift and S3 protocols. For some months now, CephFS has finally been approved for production
17%
Automate complex IT infrastructures with StackStorm
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Fré Sonneveld on Unsplash
platform [3]. StackStorm also has an auditing mechanism that records all relevant details for manual or automatic execution. The core function of the tool can be described by the cycle of trigger, rule
17%
Connecting Windows Server 2016 with Azure
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Photo by Yannick Pulver on Unsplash
. Such clusters are used in Windows Server 2016, for example, with the new Storage Spaces Direct (see the article on S2D in this issue) and Storage Replica. In such a scenario, the local volumes of the cluster
17%
OpenStack Kilo release
04.08.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Author, 123RF.com
, the single, large Neutron project will be replaced by multiple small projects with specific functions (e.g., L2 or L3 network connectivity). The parts that were outsourced, such as the LBaaS or VPNaaS plugins
17%
Let the hardware do the heavy lifting
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Photo by Victor Freitas on Unsplash
(handshake, alert, CCS, or application data) (Figure 3). After symmetric keys are programmed, inline TLS functionality is enabled; henceforth, the TLS layer bypasses all crypto operations, and plain text
17%
Changes in Exchange Server 2013
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Alessandro Russo, 123RF.com
3 for Exchange Server 2010 and a hot fix for Exchange Server 2007. Older versions such as Exchange Server 2000/2003 cannot be run with Exchange Server 2012. Public folder databases no longer exist
17%
What tools do intruders use to
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Wojciech Kaczkowski, 123RF.com
, name servers, and network hosts accessible through the Internet. The popular whois service also offers a means for discovering domain information. The Nmap scanner's -sL option (nmap -sL) performs
17%
Application security testing with ZAP in a Docker container
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Maxim Maksutov, 123RF.com
a family of wasps [2]. Although I'm a fan of Mutillidae, other applications like WebGoat [3], also from OWASP, offer a highly sophisticated and multilayered insecure web application, as well. The most
17%
A Container for HPC
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © orson, 123RF.com
. A container consists of the application itself and any library or system dependencies and is referred to as "operating system virtualization" [3]. This higher level of virtualization may allow you to use

« Previous 1 ... 106 107 108 109 110 111 112 113 114 115 116 117 118 119 ... 138 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice