Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: bring calling -(liทe@248fvcen)-สูตรหวยออนไลน์.wco ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (879)
  • Article (252)
  • News (183)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 110 111 112 113 114 115 116 117 118 119 120 121 122 123 ... 132 Next »

15%
Containers made simple
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Nathan Cima on Unsplash
to outside calls, because the API does not support password-based access. The connection can at least be secured by an SSL certificate, but this approach does not seem to make sense. The variant that uses
15%
Six new security features for  Windows Server 2022
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Lead Image © Oleksandr Omelchenko, 123RF.com
, the other server hardware, and the UEFI version. Hardware virtualization is called Intel VT-d/VT-x or AMD IOMMU, depending on the CPU vendor, but it can also be hidden under other terms or in a submenu
15%
Alternative virtualization solutions when OpenStack is too much
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Lead Image © elnur, 123RF.com
, which Proxmox can even automate when called on to do so. Of course, this only works if you have the right hardware in place. The same applies to your own storage replication stack based on ZFS
15%
Active Directory management with NetTools
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Hush Naidoo Jade Photography on Unsplash
like to avoid mouse pushing, a call for a command-line interface might be justified, considering NetTools sees itself as a purely GUI-based tool. Infos NetTools: https
15%
Databases in the Google Cloud
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Jon Parry on Unsplash
are especially popular. A simple call to create a MySQL database would be: gcloud sql instances create myinstance --database -version=MYSQL_8_0 --cpu=2 --memory=7680MB --region=europe-west3 The corresponding
15%
Distributed MySQL with Vitess
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Kheng Ho Toh, 123RF.com
. The Vitess architecture (Figure 2) is nothing like that simple. Above all, Vitess can't really be called an add-on for MySQL anymore. Although MySQL still plays a role in the context of Vitess as a possible
15%
Grafana and Prometheus customized dashboards
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Wynand van Poortvliet on unsplash
/graph (Figure 5). If you want, you can run queries in the field above the Execute button, called the expression browser. You can find instructions on how this works on the main website [10
15%
Modern implementation of DHCP with Kea
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Lead Image © Cheryl Ann Quigley, Fotolia.com
.6.0, you can generate a build with a Python 3 script called Hammer.py, which is included in the Git repository. In the example here, you will first install some dependencies, including a MySQL server
15%
Storage protocols for block, file, and object storage
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo Johannes Plenio on Unsplash
to be transferred between hosts and flash storage over a storage network based on Ethernet (the corresponding protocols are called RoCE and iWARP), Fibre Channel, or InfiniBand (Table 1). Currently, as with i
15%
Managing network connections in container environments
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Oudom Pravat on Unsplashx
to its own or another instance. Traefik calls this design "invasive" precisely because it requires every definition at the pod level to contain the components necessary for Istio. This approach

« Previous 1 ... 110 111 112 113 114 115 116 117 118 119 120 121 122 123 ... 132 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice