Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1271)
  • News (421)
  • Article (310)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 132 133 134 135 136 137 138 139 140 141 142 143 144 145 ... 201 Next »

12%
Automating system configuration with Ansible AWX
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Rungaroon taweeapiradeemunkohg, 123RF.com
as a commercial web application for managing Ansible services. Tower simplifies system administration and configuration deployment, allowing you to launch Ansible playbooks and also providing user management
12%
A versatile proxy for microservice architectures
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Russell Shively, 123RF.com
in a meaningful way, even removed from Istio. Universal Proxy The very first sentence on the Envoy website [2] reveals that the developers are seeking to provide a comprehensive solution. They refer to the tool
12%
Layer 3 SDN
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Kirsty Pargeter, 123RF.com
immediately. As a result, IT providers have become platform operators. Instead of customer-specific setups, a generic platform of compute and storage resources greets customers, who then consume bit by bit
12%
ASP.NET web development framework
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © balein, 123RF.com
.NET Core – and its use on Linux, with a focus on the peculiarities of providing ASP.Net Core applications and not on their application logic or graphical design. .NET Core Genesis At the beginning
12%
Secure authentication with FIDO2
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © lassedesignen, 123RF.com
is supported. FIDO2 even lets you as a provider prescribe and verify the type of devices used as authenticators. In the course of certification, a model key pair is generated that can also be integrated
12%
Kubernetes clusters within AWS EKS
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © Zlatko Guzmic, 123RF.com
the Kubernetes control plane away from users completely and provides access directly to the worker nodes that run on AWS Elastic Compute Cloud (EC2) [4] server instances. In the Box By concealing the Kubernetes
12%
Nested Kubernetes with Loft
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by Andrea Davis on Unsplash
of Kubernetes namespaces initially exists in its own API, which raises the question of how the commands from Loft services then become Kubernetes commands and, ultimately, provide rolled-out pods. To achieve
12%
Incident Analysis with The Hive and Cortex
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © Kurhan, 123RF.com
in an exchange with other analysts, the developers rely on MISP, an established sharing platform. Cortex [4] is another tool that provides additional functionality for analysis with what are referred
12%
Kolab iRony with CalDAV and CardDAV support
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Pablo Hidalgo, 123RF.com
]. Figure 1: Kolab Systems offers a web service that includes all the features of the Kolab groupware. This figure shows the file browser, which is provided by SabreDAV. Installation A complete test
12%
Up close with SUSE Linux Enterprise 12
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © kasza, 123RF.com
with its own command-line tool. The question is whether SUSE is doing itself a favor with Wicked – hardcore admins don't typically appreciate new tools that perform provide basic tasks with a higher

« Previous 1 ... 132 133 134 135 136 137 138 139 140 141 142 143 144 145 ... 201 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice