Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: opens ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1135)
  • News (398)
  • Article (298)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 130 131 132 133 134 135 136 137 138 139 140 141 142 143 ... 184 Next »

18%
Comparing PowerShell and Python
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Beboy, Fotolia.com
shells also support this technique, the use of this mechanism in PowerShell in an object-oriented way opens up new possibilities. For example, a cmdlet such as Get-Service, which creates a list of Windows
18%
Goodbye cloud VMs, hello laptop VMs
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © Liubomyr Feshchyn, 123rf.com
VMs on Ubuntu 20.04 LTS running Cassandra, Consul, OpenSearch, Kafka, Nomad, Spark, and Vault with a single command. To get the wrapper, just download the sources with: git clone https
18%
Azure AD and AD Domain Services for SMEs
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Alessandro Erbetta on Unsplash
for several minutes, some administrators ignore the issue of security altogether, which in turn opens the door to attackers, meaning you then have to worry about data security at least as much as you would
18%
Distributed Linear Algebra with Apache Mahout
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Peter Galbraith, Fotolia.com
easy. First, it creates an abstraction layer on the underlying engine (the open source version of Mahout uses Apache Spark as an engine), and the abstraction layer implements basic linear algebra
18%
Diving into infrastructure security
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © JPaget RFphotos, 123RF.com
's computers, you need technical support. One possibility is the well-known GRR Rapid Response open source tool [6]. With its client-server architecture, GRR enables centralized management and asynchronous
18%
IAM for midmarket companies
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Robert Anasch on Unsplash
not only support for common identity federation standards such as OAuth, OpenID Connect [2], and security assertion markup language (SAML), but also web access management for legacy applications
18%
Microsoft 365 DSC
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Will Myers on Unsplash
the -Device Login parameter. Now a code is generated in PowerShell, which you then enter in the browser window that opens before logging in with the username and password. For more information, see the Power
18%
Microsoft 365 and Teams settings and security
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Amol Tyagi on Unsplash
, because the functions are not enabled by default. PowerShell Connection To connect by PowerShell to Exchange Online, first store the credentials in a variable: $user = Get-Credential Now open a session
18%
Linux Storage Stack
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © arsgera, 123RF.com
possibilities that VFS encapsulation opens up. The aforementioned system calls are unified functions, such as open, read, or write, no matter what filesystem is hidden underneath. The specific filesystem
18%
Clone and deploy desktop computers with FOG
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Nikita Rogul, Fotolia.com
will display a URL for FOG's Dashboard, such as http://10.0.0.1/fog/management (Figure 1). Open the link in your web browser and log in with the default username (fog) and password (password). Before going

« Previous 1 ... 130 131 132 133 134 135 136 137 138 139 140 141 142 143 ... 184 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice