Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: [tippo365.com]time its go each real money[tippo365.com]time its go each real moneygram ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (733)
  • Article (234)
  • Blog post (6)
  • News (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 ... 98 Next »

11%
New features in jQuery 3
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Marc Dietrich, 123RF.com
. In this way, jQuery helps build complex, dynamic web applications. Its wide distribution also helps promote large content management systems (CMSs) like Joomla or WordPress, which provide or even use j ... The functions and objects of the jQuery JavaScript library make the work of web developers much easier. Although jQuery 3 remains largely compatible with version 2, some changes might prevent its use.
11%
High-performance load balancing
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © meyrit, 123RF.com
changes, among other things. The developers decided to program the tool in Go, which is particularly suitable because of its powerful options for implementing parallel routines and simple interprocess
11%
Common DevOps Mistakes
29.11.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © leeavison, 123RF.com
mistakes and how to avoid them. Eschew DevOps Departments I led with the background of software development, because it’s important to understand where it”s been and where it’s going. Decades and untold
11%
Sync identities with Microsoft Identity Manager
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © alphaspirit, 123RF.com
the service remains the same at its core. If you install Azure AD Connect, then a version adapted to Azure AD ends up on the intended server to handle the user information in Office 365. Structure ... Learn how Microsoft Identity Manager 2016 can help sync identities in the local AD as well as Azure AD and Office 365.
11%
Modern Fortran for today and tomorrow
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © homestudio, 123RF.com
into its own file. Each file that needed access to the common block "included" the file of common blocks. Another feature, or limitation, of Fortran is that all arrays have to be fixed in size at compile
11%
We interview Red Hat CEO Jim Whitehurst
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Jim Whitehurst
to culturally shift how we develop, build, and deploy technology. It's going to take a level of patience and collaboration that may feel foreign and new to many, but this step is critical if companies want to set
11%
Test your system to help fight phishing attacks
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by David Clode on Unsplash
between messages, if necessary, (3) track the results, which Gophish visualizes in real time on its dashboard. Preparing a Campaign On Windows you launch the environment by running gophish.exe; on mac
11%
ClusterHAT
10.07.2017
Home »  HPC  »  Articles  » 
and ensuring that everything works correctly, you can then reboot all of the nodes at once. Now you can test the cluster by running some MPI code on it. MPI Code Example I'm not going to cover "benchmarks
11%
Network Grep
26.11.2012
Home »  Articles  » 
 
hand, you might need to check the exact nature of an attack to perform some real-time forensic diagnostics to circumvent it. Leaving the networking aspects entirely aside for a moment, even an admin
11%
Outfitting an IT training environment with Docker containers
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Kamonrat Meunklad, 123RF.com
access for each participant. Monitoring users' systems in real time is possible through logfiles by using simple commands. The creation of user accounts and allocation of containers for each user

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 ... 98 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice