Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (995)
  • Article (277)
  • News (260)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 120 121 122 123 124 125 126 127 128 129 130 131 132 133 ... 154 Next »

11%
Nagios on a Rasp Pi 3 with NEMS
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Chris Gendreau; Fotolia
with an updated version of NConf [4] called NEMS Configurator. This application is found on the Configuration menu and is used to automate the generation of Nagios3 configurations. To access, log on using the user
11%
Comparing PowerShell and Python
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Beboy, Fotolia.com
in the system settings. As of Windows 10 Insider Preview Build 14971.1000, Microsoft has changed the default so that PowerShell is called as the default command line in the Power menu. Just like Python, Power
11%
Azure AD and AD Domain Services for SMEs
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Alessandro Erbetta on Unsplash
directory service. The good news is that Microsoft now also offers a "real" Active Directory in its cloud – Azure Active Directory Domain Services (Azure AD DS, sometimes called AAD DS) [2] – although
11%
Statistics and machine learning with Weka
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Shane Rounce on Unsplash
in the Weka graphical user interface (GUI) or by application programming interface (API) calls in Java code. In this article, I only look at the GUI. The first window you encounter is the Weka GUI Chooser
11%
Detect anomalies in metrics data
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © rudall30, 123RF.com
. If you keep too much legacy information in Prometheus, calling individual Grafana dashboards will soon take several seconds. Intelligent downsampling of data is missing, as is high-performance storage
11%
Best practices when working with Docker images
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Ilse Orsel on Unsplash
cases the so-called multistage builds can help. To understand their usefulness, have a look at Listing 1, which contains a simple C command-line interface (CLI) application; when you compile it with GCC
11%
Secure collaboration
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Mateusz Klein on Unsplash
a matter of a program's immediate runtime environment (i.e., the shared dynamic system libraries). Calls to the program and library kernel functions can even be processed by a single kernel
11%
Rolling back from Windows 11 to Windows 10
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by cdd20 on Unsplash
you install them, including the update to Windows 10 21H2 and newer. Of course, you should also check to see whether Windows 10 is still enabled by calling slui.exe. Last but not least, take a look
11%
Users speak on Kubernetes in business practice
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © alphaspirit, 123RF.com
, this service is available through dealers and is called Certified Pre-Owned [3], and in the UK, Approved Used [4]. The basis of the application infrastructure for Porsche Informatik's solutions and services
11%
Diving into infrastructure security
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © JPaget RFphotos, 123RF.com
. Classic antivirus programs protect your computer by means of bytecode signatures or use heuristics that combine special system calls or file and hardware access. HIDS also monitors user actions, files

« Previous 1 ... 120 121 122 123 124 125 126 127 128 129 130 131 132 133 ... 154 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice