Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1271)
  • News (421)
  • Article (310)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 122 123 124 125 126 127 128 129 130 131 132 133 134 135 ... 201 Next »

12%
The new OpenStack version 2014.1 alias "Icehouse"
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Jakub Krechowicz, 123RF.com
the various components unnecessarily bloats the code. The problem is already known in virtually any programming language, and the solution is a library. Libraries provide a unified API, which other programs
12%
Grafana and time series databases
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Raoul Fesquet, fotolia.com
or a public cloud environment, is strongly dependent on MAT. Only MAT provides reliable clues on the health and usage of systems that let you know when you need to add new hardware because your platform
12%
Correctly integrating containers
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Beboy, Fotolia.com
be easily integrated into the virtual private cloud (VPC) networks of some cloud providers. For more complex networks, Kubernetes supports a concept called container network interface (CNI) that allows
12%
Convert Linux shell commands into PowerShell cmdlets
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Larisa Birta on Unsplash
.1 or PowerShell 7.0. I used a Windows 10 workstation for this example. Annoyingly, it came with PowerShell version 5 out of the box. Microsoft provides the latest stable version of PowerShell in a Git
12%
Six new security features for  Windows Server 2022
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Lead Image © Oleksandr Omelchenko, 123RF.com
, provided the hardware and virtualization are ready for them. Secure Boot Explained Security starts as early as the BIOS, or more likely in a state-of-the-art Unified Extensible Firmware Interface (UEFI
12%
Kubernetes containers, fleet management, and applications
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Murilo Viviani on Unsplash
in. Because the solution is constantly evolving – with custom resource definitions, providers, and replica sets – even many die-hard admins of the early days of K8s have lost track of what's what
12%
Samba domain controller in a heterogeneous environment
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Zachary Nelson on Unsplash
. FreeIPA lacks some features needed to act as a DC that a Windows system provides over the Server Message Block (SMB) and Common Internet File System (CIFS) protocols. Version 4 of the well-known open
12%
Grafana and Prometheus customized dashboards
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Wynand van Poortvliet on unsplash
Visualizing data trends and issues when they arise is clearly of significant benefit, whether for applications or the systems on which they run. Having access to sophisticated tools that can provide
12%
Using the MQTT IoT protocol for unusual but useful purposes
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Heiko Küverling, 123RF.com
.argv[0], qos=0, retain=False) The user now receives information as soon as the client terminates (with Ctrl+C). The project mqttwarn [4] provides a Python tool with many plugins for such monitoring
12%
Backups using rdiff-backup and rsnapshot
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Dmitry Pichugin, Fotolia.com
for automation are not password protected. In this article, I provide a detailed set of instructions for how to counteract these weak points using the following simple restrictions: Create a separate key pair

« Previous 1 ... 122 123 124 125 126 127 128 129 130 131 132 133 134 135 ... 201 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice