Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (241)
  • Article (11)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 26 Next »

25%
Collaborative online office solutions
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Photo by Truong Trung Cap Kinh Té Du Lich Thành Pho Ho Chí Minh CET on Unsplash
on a comment, a line points directly to the corresponding passage in the text, making the area to which the comment refers clearly visible. Using a small three-line (hamburger) menu on the right side
25%
Collecting application logfiles with Kubernetes
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bowie15, 123RF.com
for application developers. Administrators of a scaling environment also need to stay on top of things: both metrics and logs. In monolithic scenarios, the administrator can simply integrate a log collector client
25%
Zuul 3, a modern solution for CI/CD
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © lightwise, 123RF.com
of three jobs. The first, clang, is a static C++ code analysis. The other two are compilation variants according to the processor architecture: one for i686 and the other for x86_64. In this case
25%
Designing a Secure Active Directory
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Samantha Sophia on Unsplash
. However, three other ADs belong to the Windows server family. First is the Active Directory Rights Management Service (ADRMS), a cryptography tool for protecting digital content such as documents, email
25%
Infrastructure as Code with Terraform
20.06.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
© fotolia.com
.chris_A_record.records  correctly, it should make sense. Enough Foutering Now it’s time to put these two minuscule snippets at the top and bottom of my slightly longer file, which I call main.tf . In Listing 2, you can see
25%
AlmaLinux and HPC
31.01.2024
Home »  HPC  »  Articles  » 
have turned to AlmaLinux, including MEGWARE, CERN, and University College London (UCL). We had the opportunity to interview all three companies about their adoption of AlmaLinux in an HPC environment
25%
Managing Ubuntu with Canonical Landscape
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Kitsadakron Pongha, 123RF.com
the line, the setup script asks you for the access key you created previously. Without generating the key, the prompt would not occur. You can then enter an HTTP and HTTPS proxy, if needed. The next prompt
25%
Platform independence with PowerShell Core
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image Photo by Harli Marten on Unsplash
and high-level languages for administrative purposes was something that could no longer be reasonably expected. The result was the multilayer architecture of PowerShell. The commands form the top
25%
Network overlay with VXLAN
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Fikri Rasyid on Unsplash
Spanning Tree (IEEE 802.1w), or Multiple Spanning Tree (IEEE 802.1s). All three have the advantage of ensuring loop-free operation. Layer 2 loops overload the switches and can be complex to troubleshoot
25%
Secure status and event monitoring of tier 0 systems
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Brian Jackson, 123RF.com
SCOM, setting up tier-specific distributed monitoring is somewhat more complex and requires you to create at least three management groups (MGs) [7] (Connected MG, Tier 1, and Tier 0), each

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 26 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice