Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1285)
  • Article (342)
  • News (220)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 141 142 143 144 145 146 147 148 149 150 151 152 153 154 ... 186 Next »

13%
The new version of Chef Automate comes with many new features
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Rock'n Roll Monkey on Unsplash
built by VulcanoSec [2] to monitor compliance standards automatically, was acquired by Chef. Earlier versions of InSpec discussed in ADMIN [3] proved to be extremely powerful. With the use of a special
13%
Automated OpenStack instance configuration with cloud-init and metadata service
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © jeka81, 123RF.com
discovery. 3. Network. With networking configured on an instance, this stage runs the disk_setup and mounts modules and configures mount points. 4. Config. This stage runs modules included in the cloud
13%
Five Kubernetes alternatives
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © alphaspirit, 123RF.com
little, even if some functions are implemented or named differently on one side or the other. Whether you rely on Kubernetes or Swarm is a matter of taste. Nomad Nomad [3], developed by HashiCorp, takes
13%
IPv6 security on IPv4-only networks
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © foottoo, 123RF.com
6105) [3] and DHCPv6-Shield [4]. These functions are implemented on switches and referred to as First Hop Security. SEND (Secure Neighbor Discovery) [5] is an approach that relies on cryptographically
13%
User licensing in Microsoft networks
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Wong Yu Liang, 123RF.com
on the VM price per minute (Figure 3). If you install your own SQL Server image in a Windows Azure VM, you can use Software Assurance's aforementioned license mobility
13%
Searching for security flaws and exploits with Burp Suite
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
tab within the Proxy section. For the rest of the exercise, you'll need a browser (Firefox), two Firefox extensions (Cookies Manager+ [2] and FoxyProxy Standard [3]), and Burp Suite
13%
Programming with Node.js and JavaScript
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © lightwise 123rf.com
Script. This approach allows event-based processing of work requests and, thus, more concurrent requests than the Apache server can handle – although Apache also has an event-based processing module [3] in its more
13%
Container Virtualization Comeback with Docker
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © ping han, 123RF.com
asserted itself in Docker, as in Amazon's EC2 or OpenStack. Besides the docker command-line tool, a GUI by the name of DockerUI [2] is also available (Figure 2), and a competitor known as Shipyard [3] vies
13%
Cloud-native application bundles for easy container deployment
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © nattapol sritongcom, 123RF.com
standard that can even be distributed from Docker Hub. Duffle Duffle (Figure 3) unabashedly refers to itself as the reference implementation of the CNAB format and provides a variety of functions
13%
The TensorFlow AI framework
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © lassedesignen, Fotolia.com
how to identify cacti in images [2]. © Kaggle Another impressive example of a dataset is the MNIST database (Figure 3), which contains nearly 60,000 handwriting samples in the form of single

« Previous 1 ... 141 142 143 144 145 146 147 148 149 150 151 152 153 154 ... 186 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice