Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: "0mbén Llorente%2222 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (937)
  • Article (296)
  • News (166)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 120 121 122 123 124 125 126 127 128 129 130 131 132 133 ... 141 Next »

28%
Test JavaScript programs with Karma
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image Photo by Pierre Bamin on Unsplash
to established test frameworks, such as Jasmine [2], Mocha [3], or QUnit [4], relying on plugins to do so and negating the need for web developers to learn new software. You can also integrate in-house test
28%
Protect Azure resources with Network Security Groups
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © ogm & roywylam, 123RF.com
a VM in the virtual network settings (Figure 2), you can also configure an NSG there. From the list, select the NSG you previously created, thereby assigning the VM and the entire virtual network
28%
Debian's quest for reproducible builds
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Author, 123RF.com
source with bit precision at any time (Figure 1). If things go the way that reproducible builds' creators intend, the future definition of free software will include mandatory reproducibility (Figure 2
28%
Open source intelligence tools for pen testing
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
into multiple steps. In Figure 2, for example, I present a scheme I created for a few networks I have audited over the years. Figure 2: Custom hacker lifecycle
28%
Professional PowerShell environments
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © lightwise, 123RF.com
Windows Service as the project. 2. Create a runspace with the System.Management.Automation.Runspaces namespace. 3. Create the payload (i.e., the source code). 4. Install the service with install
28%
Boosting Performance with Intel’s QuickAssist Technology
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Wayne Daniels, 123RF.com
as an adapter between the Intel QuickAssist API and the interface expected by industry standard frameworks. Figure 2 shows how you can integrate Intel QuickAssist Technology at multiple levels
28%
IoT for IT
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Bruce Rolff, 123RF.com
, the IT industry needed new online services to ensure the future of the Internet as a growth market. Meanwhile, about 88 percent of North American households are online [2], and a certain degree of saturation has
28%
Supercomputing Conference 2024
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © djem, 123RF.com
, Michael, and Doug. They, and others, are the unsung heroes putting this party together. SCinet and Power One thing I learned this year is that SCinet [2], which was used for Internet access during
28%
High-performance load balancing
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © meyrit, 123RF.com
access to the various servers. Seesaw v2 comes into play wherever high-performance load balancing is required. Seesaw only works up to Layer 4 and can therefore act faster than other potential candidates ... Seesaw v2 is a sophisticated solution for load balancing in Layer 4 on networks subject to heavy traffic and facilitates the removal, maintenance, and integration of individual servers. ... Seesaw v2
28%
Tech News
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
 
and Orchestration The U.S. National Security Agency (NSA) has issued guidance on "Advancing Zero Trust Maturity Throughout the Automation and Orchestration Pillar" (https://media.defense.gov/2024/Jul/10/2003500250/-1/-1/0

« Previous 1 ... 120 121 122 123 124 125 126 127 128 129 130 131 132 133 ... 141 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice