Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (133)
  • Article (14)
  • Blog post (3)
  • News (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 8 9 10 11 12 13 14 15 16 Next »

16%
Kick-start your AI projects with Kubeflow
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © austler, 123RF.com
the use of pipelines (i.e., defined processes containing many steps), with the help of which a model can be developed and trained from the first evolutionary stage to completion. Git also plays a crucial
16%
Error-correcting code memory keeps single-bit errors at bay
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Igor Stevanovic, 123RF.com
Data protection and checking occurs in various places throughout a system. Some of it happens in hardware and some of it happens in software. The goal is to ensure that data is not corrupted
16%
Matlab-like tools for high-performance computing
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
not be the answer for some people (e.g., they can't afford Matlab or can't afford 25,000 licenses, they just want to try a few Matlab features, or they want or need access to the source code). This brings up
16%
Interview with Gregory Kurtzer, Developer of Singularity
21.04.2016
Home »  HPC  »  Articles  » 
system image, so updates and package installations use standard means (e.g., Yum/Apt). To mimic these features in containers that share the kernel with the host, you must start off with a fully installed
16%
Automated compliance with Chef InSpec
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © pandavector, 123RF.com
. Everyone is familiar with configuration files. They have certain basic formats (e.g., .ini) in which they can be written. The administrator would need to retype the keywords the developers of a program use
16%
Self-signed certificates with Jenkins
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Art Lasovsky on Unsplash
. Line 47 in an online example that shows the Dockerfile used to create the LTS image should convince you [4]. Step 2 Visit the website that you want Jenkins to trust (e.g., with Google Chrome on Linux
16%
When are Kubernetes and containers not a sensible solution?
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Kelly Sikkema on Unsplash
also makes updating easier. If in doubt, the admin simply stops a running container, checks out the new version of the image, starts it with the old configuration and data, and the job is done
16%
Automation with Chef
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Pablo Bustos on Unsplash
), Microsoft Azure, and Google Cloud Platform (GCP) or with the target environments and systems over SSH and Windows Remote Management (WinRM). Chef InSpec takes care of continuous verification. In addition
16%
Interview with the developer of Singularity
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © wu ruiyun, 123RF.com
, or disk space. It also requires a full operating system image, so updates and package installations use standard means (e.g., Yum/Apt). To mimic these features in containers that share the kernel
16%
Intrusion Detection with OSSEC
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Photo by Rayner Simpson on Unsplash
) stack. Central administration and thousands of rules, as well as role-based authorizations and a comprehensive reporting system, are restricted to the scope of the commercial-grade Atomic OSSEC version

« Previous 1 ... 8 9 10 11 12 13 14 15 16 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice