Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1572)
  • Article (347)
  • News (205)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 136 137 138 139 140 141 142 143 144 145 146 147 148 149 ... 213 Next »

18%
Visualizing kernel scheduling
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © 36clicks, 123RF.com
of implementing scheduling policies [3] that determine which processes will run where and for how long. If you are seeking to improve system performance by manipulating these policies, SchedViz is invaluable
18%
Hands-on test of Windows Subsystem for Linux
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image Craig Whitehead on Unsplash
(Figure 2). Once the installation is complete, type bash to display the prompt (Figure 1, bottom). Like all applications under Windows, the bash shell shown in Figure 3 is launched from the Start menu
18%
Detecting security threats with Apache Spot
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Photo by Geran de Klerk on Unsplash
risks, quantifying possible data loss and responding to attacks. Apache Spot [3] uses big data and modern ML components to improve the detection and analysis of security problems. Apache Spot 1.0 has been
18%
Open source customer relationship management software
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Martina Berg, Fotolia.com
With the supporting dependencies installed, you are now ready to download the latest stable SuiteCRM package [3]. At the time of writing, the latest release was version 7.10.11, which is the version I work
18%
Shifting Drupal to Amazon's cloud
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Devaev Dmitry, 123RF.com
(CNAME) records [3] for the application to enable access to the corresponding website via the Internet. The usual format for a CNAME entry is: ..elasticbeanstalk.com The domain name can
18%
Scale Your Docker Containers with Docker Swarm
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Author, 123RF.com
, on success, you will see that the node has been joined to the swarm (Figure 3). Run that same join command on all the nodes you want in the swarm. Once you're done, head back to the manager and, again, issue
18%
Mesos compute cluster for data centers
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Artisticco LLC, 123RF.com
. The current version is Mesos 0.21. Two years after the first release, the developers presented a far more advanced variant [3] at a 2011 Usenix conference. Twitter engineers had already been running Mesos
18%
Container orchestration with Kubernetes from Google
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Kirsty Pargeter, Fotolia.com
. Figure 1: Docker can only use containers on the local host out of the box. Kubernetes is designed to expand the tool for fleet capacity. Kubernetes has competitors: CoreOS [3] and Red Hat's Atomic
18%
Zabbix release 2.2
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © bowie15, 123RF.com
. Zabbix also is included in the repositories of many distributions, although typically as version 2.0.9. The Zabbix team also offers Zabbix virtual appliances based on openSUSE 12.3 for VMware, Virtual
18%
Microsoft Network Policy Server
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Lexip, Fotolia.com
-in is explicitly allowed or denied in the properties of the user object in AD. The next step is to configure the authentication methods (Figure 3). You can choose from legacy and possibly insecure protocols

« Previous 1 ... 136 137 138 139 140 141 142 143 144 145 146 147 148 149 ... 213 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice