Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (833)
  • Article (178)
  • News (109)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 20 21 ... 113 Next »

45%
Container IDE with cloud connection
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Photo by Christin Hume on Unsplash
choice does not provide. Developers either have to grin and bear the installation overhead, or they can resort to a virtual machine or Docker image. Although this solution might work well for individual ... Containers and Virtualization
45%
Validating Docker containers
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © 36clicks, 123RF.com
, respectively. They can be used, for example, to create a virtual environment in a Python container and then fetch the Django framework with the pip package manager: setup: [["virtualenv", "/env"], ["pip ... Containers and Virtualization
45%
Google Cloud Storage for backups
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © lightwise, 123RF.com
Amazon Simple Storage Service (Amazon S3) is considered the mother of all object memories and, thanks to its great durability, availability, and built-in scaling, has been virtually unrivalled thus ... Containers and Virtualization
45%
Cost management for cloud services
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Elijah Mears on Unsplash
the environment is complicated by the fact that the developers provide virtually no information on the options. To start the deployment of the web application and PostgreSQL database, type: make oc ... Containers and Virtualization
45%
Tools for managing AWS cloud services
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by elnaz asadi on Unsplash
the previous password change guide; then, expand the MFA section. Select Manage MFA or Activate MFA and follow the instructions to reflect the key type: Virtual MFA Device, U2F Security Key, or Hardware MFA ... Containers and Virtualization
45%
Kubernetes networking in the kernel
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © balein, 123RF.com
influences (virtual extensible LAN (VxLAN) traffic is trivial to collect and snoop on, as you'll see later); to exert granular control over which pods can talk to which other pods and for what purposes ... Containers and Virtualization
45%
Web applications with Julia
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © sony sivanandan, 123RF.com
of accomplishing this added security is to confine the Julia process on the server to some type of virtual environment, such as a container from which it is impossible to see the machine's root filesystem. The use ... Containers and Virtualization
45%
Automatic build and deploy with OpenShift and GitLab CI
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Photo by Jantine Doornbos on Unsplash
a virtual machine (VM). Next, create a new project on OpenShift in the user interface, as shown in Figure 1; I refer to this project as slides ... Containers and Virtualization
45%
Kubernetes clusters within AWS EKS
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © Zlatko Guzmic, 123RF.com
to make the API endpoint private, you restrict traffic to resources that reside inside the virtual private cloud (VPC) into which you have installed your EKS cluster. However, you can also leave the API ... Containers and Virtualization
45%
Adding high availability to a Linux VoIP PBX
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Lead Image © MIR, Fotolia.com
are using virtual machines, this process is as easy as copying some files, but if you are setting up two identical physical boxes, I recommend you use the dd command across the network to clone the first ... Containers and Virtualization

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 20 21 ... 113 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice