Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (969)
  • Article (306)
  • News (173)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 108 109 110 111 112 113 114 115 116 117 118 119 120 121 ... 146 Next »

17%
Efficient password management in distributed teams
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © Sergey Nivens, 123RF.com
). Listing 3 package.json 01 { 02 "name": "linux-magazin-secrets", 03 "version": "1.0.0", 04 main() "index.js", 05 "license": "ISC", 06 "dependencies": { 07 "express": "^4.14.0" 08
17%
Cloud protection with Windows Azure Backup
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Oleksiy-Mark, 123RF.com
:\Program Files (x86)\Windows Kits\8.0\bin\x64 directory. You can create a certificate like this: makecert.exe -r -pe -nCN= -ssmy -sr localmachine-eku \ 1.3.6.1.5.5.7.3.2 -len 2048 -e01
17%
The limits and opportunities of artificial intelligence
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © sebastien decoret, 123RF.com
research and applications such as Industry 4.0. Protzel: That's right; Germany also jumped on the bandwagon (with quite some delay). This doesn't have to be negative – many trains travel in the wrong
17%
The new OpenShift version 4
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Artem Egorov, 123RF.com
(Kubernetes authors, CC BY 4.0 [1]). Most developers of applications will not want to deal with Kubernetes and the operation of the platform itself. What they really want is a kind of Kubernetes
17%
GitLab for DevOps teams
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © maroti, 123RF.com
). Figure 3: For 2019, the GitLab project has shifted its focus to continuous deployment and security testing. Source: GitLab; CC BY-SA 4.0 [18]. The most interesting novelties from a DevOps point
17%
A service mesh for microarchitecture components
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Alexey Shkitenkov, Fotolia.com
behavior of the load balancer as a whole (e.g., all requests with the user agent Google Chrome end up with version 1.0 pods of application X, and all requests with Firefox land on version 1.1 pods
17%
Implementing custom security frameworks with Bro
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Yuri Arcurs, fotolia.com
, and then specifies the interface. In this example, I'm using a virtualized Ubuntu system on a new-ish Ubuntu host, so the interface name is enp0s3 , rather than something standard such as eth0 or wlan0 . Once you
17%
Setting up and managing IPv6 on Windows Server 2016
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © Photo by mathyas kurmann Unsplash.com
looks like this: 001:0db7:85b3:07d3:1319:8a2d:437a:63d4 . These addresses are difficult to memorize and assign manually. Consequently, automatic assignment is the way to go in IPv6 infrastructures. All
17%
Live migration of virtual machines with KVM
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © SV-Luma, 123RF.com
to allow the no_root_squash option. A line for this purpose in /etc/exports would look like this: /nfs 192.168.1.0/ 24(rw,no_root_squash) It allows all the computers on the 192.168.1.0 network to mount
17%
Optimize and manage Linux-based Azure VMs
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Allan Swart, 123RF.com
control swap usage. The swappiness parameter ranges from 0 to 100, where a lower value reduces swap usage, which might be desirable for certain memory-intensive applications. To check and change your

« Previous 1 ... 108 109 110 111 112 113 114 115 116 117 118 119 120 121 ... 146 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice