Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: brain causing -(liทe@248fvcen)-สูตรหวยออนไลน์.wco ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1075)
  • Article (285)
  • News (93)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 131 132 133 134 135 136 137 138 139 140 141 142 143 144 ... 146 Next »

24%
Focusing on security in Active Directory
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © Mykola Velychko, Fotolia.com
, small and medium-sized companies should position themselves as enterprise environments, which, in most cases, have access to significantly more resources for securing their IT infrastructure. Microsoft
24%
Continuous integration with Docker and GitLab
17.07.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © alexutemov, 123RF.com
would have to follow the maintenance cycles of the distributor whose Linux product is running on your own servers. If an update goes wrong, in the worst case, the entire boot infrastructure is affected
24%
Effective debugging of Docker containers
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © Stuart Monk, Fotolia.com
in the worst case, the container crashes immediately after the docker run command. When starting a Docker container, two entries in the Dockerfile play a role: ENTRYPOINT and CMD. Many administrators don
24%
Getting a free TLS certificate from Let's Encrypt
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Stuart Miles, 123RF.com
in case of a problem. To set up Let's Encrypt: cd /root git clone https://github.com/letsencrypt/letsencrypt cd letsencrypt ./letsencrypt-auto --server https://acme-v01.api
24%
Build storage pools with GlusterFS
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © jala, Fotolia.com
the data, with the use of translators. For distributed and mirrored data, the smallest unit is the file itself; in the case of striping, individual chunks of a file are distributed across the systems
24%
Four solutions for Prometheus long-term storage
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © sidewaypics, 123RF.com
that the hosted version of Mimir is now handling more than a billion active data series and that Mimir can cope with this volume without any problems. © Grafana Labs As is so often the case in the community
24%
Your own AWS-compatible cloud with Eucalyptus
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Author, 123RF.com
. To stop the virtual machine in the web interface, uncheck the little box in the first column and then select the desired action below More actions , which is Terminate in this case. Future The default
24%
Citrix XenServer 6.2 goes open source
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © George Tsartsianidis, 123RF.com
in shared storage. Focus on VDI and Virtual 3D Users If you rely on virtual desktops with powerful 3D graphics performance, as is the case, for example, in CAD applications, you might want to pass
24%
Flexible backup for large-scale environments
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Photo by Nils Bouillard on Unsplash
.4TB and uses NVMe devices for performance reasons. Experience has shown that the database server also needs plenty of RAM – 512GB in this specific case. Almost all the processes within the Bacula
24%
Six storage drivers for Kubernetes
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © webreporter, photocase.com
means users can use a three-replica setting for critical applications while relying on unreplicated volumes for test setups where redundancy requirements are not as strict. The latter case is also

« Previous 1 ... 131 132 133 134 135 136 137 138 139 140 141 142 143 144 ... 146 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice