Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: opens ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1153)
  • News (399)
  • Article (299)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 148 149 150 151 152 153 154 155 156 157 158 159 160 161 ... 186 Next »

18%
Your own AWS-compatible cloud with Eucalyptus
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Author, 123RF.com
been available ever since in two flavors: a free open source version, which is completely under the GPLv3 license, and the commercial Eucalyptus Enterprise Edition, which supports the integration of SANs
18%
Build and host Docker images
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Sebastian Duda, 123RF.com
remains open; otherwise, the runtime environment would terminate the container immediately. Next is building and launching the image: $ docker build . -t lm-example/nginx $ docker run -d -p 80:80 am
18%
Recovering from a cyberattack in a hybrid environment
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Photo by Kelly Sikkema on Unsplash
are just as varied. A classic attack scenario focuses on the local part of the organization. The attacker typically takes complete control of AD, ultimately to destroy it. This positioning also opens
18%
Network load balancing on Windows Server
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Photo by Nathan Cima on Unsplash
Network means all cluster nodes can open a connection to the client, and None drops the relationship. Check the settings and discover the best option for your requirements. Port rules also determine which
18%
Build a secure development and production pipeline
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Félix Prado on Unsplash
, and implement secure architectures. For threat modeling, you can use the Open Web Application Security Project (OWASP) threat modeling tool Threat Dragon [1]. DevSecOps Principles The key DevSecOps principles
18%
Agentless automation with Event-Driven Ansible
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © Valery Kachaev, 123RF.com
active connections to all monitored servers open. In many places, administrators collect all logfiles in a centralized database anyway. To ensure that the log data is not only available to a single
18%
Sharding and scale-out for databases
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Photo by Dan Dennis on Unsplash
, this is only a valid user story in environments where suitable as-a-service offerings exist at all, which is precisely what private cloud environments, such as those based on OpenStack, often do not offer
18%
What's left of TLS
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Maria Dryfhout, 123RF
and ensure that only the current version of the SSL library  – in most cases OpenSSL – is used, with all security updates in place. Your Apache Configuration On the Apache web server, you can set
18%
Portable home directory with state-of-the-art security
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © SOMYOT TECHAPUWAPAT , 123RF.com
systems or distributions. A home directory from openSUSE Leap is unlikely to harmonize with Raspbian as used on a Raspberry Pi. If you want to avoid compatibility problems, you need to take manual steps
18%
Tuning loops – from loop unrolling to Duff's device
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
in reverse often produces less optimal code, but might open code to other approaches. Loop perforation Stochastic non-execution of some loop cycles. Suitable for some algorithms (e.g., neural

« Previous 1 ... 148 149 150 151 152 153 154 155 156 157 158 159 160 161 ... 186 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice