Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (995)
  • Article (277)
  • News (260)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 107 108 109 110 111 112 113 114 115 116 117 118 119 120 ... 154 Next »

11%
NetFlow reporting with Google Analytics
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Qi Feng, 123RF.com
pages or web services. Examples of use provided in the official documentation count the installations of an iPhone/Android app, identify in-app purchases, and log time metrics. The training materials call
11%
OpenStack Kilo release
04.08.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Author, 123RF.com
. Figure 1: Ceilometer uses a design that not even its original author supports, but nothing changes in Kilo. Four-Point Program The Big Tent initiative will mean that any project can call itself
11%
LDAP integration with popular groupware suites
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Sergey Tryapitsyn, 123RF.com
-Xchange, administrators can call up this routine on the command line. A sync agreement must be drawn up in Scalix before first use. This agreement is supposed to show the trust between the directory and the groupware
11%
Improved Performance with Parallel I/O
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Ying Feng Johansson, 123RF.com
this common pattern, usually called "file-per-process." Each TP performs all I/O to its own file. You can keep them all in the same directory by using different file names or you can put them in different
11%
Clusters with Windows Server 2012 R2
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Jakub Gojda, 123RF.com
on Windows Server 2012 R2. Search for iscsi in the home screen and then launch the tool. When you first call the tool, you need to confirm the start of the corresponding system service and unblock the service
11%
The limits and opportunities of artificial intelligence
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © sebastien decoret, 123RF.com
is from interstellar space travel. So, if weak AI has so little intelligence in this sense, should we even call it AI? According to Gallwitz, that would be as if we were to call the bang in the sky
11%
Red Hat Enterprise Linux 8 pre-series test
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image Photo by Filip Mroz on Unsplash
on site. Figure 3: The yum command can still be called, but it is only a link to DNF. One advantage of DNF over Yum is that it offers a defined
11%
Registry for Docker images
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Viktoriya Malova, 123RF.com
with the call shown in Listing 5. Now you can use the registry as shown previously: Store the user accounts and ACLs in the docker_auth configuration file as described and restart the container. In the log output
11%
Docker image security analysis
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Photo by Rodolfo Sanches Carvalho on Unsplash
broken into your container and is about to start breaking things. I call this "anomalous behavior." Red flags could include network ports being opened unexpectedly, disk volumes being mounted without
11%
A service mesh for microarchitecture components
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Alexey Shkitenkov, Fotolia.com
. In the load balancer example, this means that for certain browser variants, the admin does not define in detail which instances of a certain pod will receive which calls but only specifies the desired call

« Previous 1 ... 107 108 109 110 111 112 113 114 115 116 117 118 119 120 ... 154 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice