Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xsede%3 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1572)
  • Article (347)
  • News (205)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 164 165 166 167 168 169 170 171 172 173 174 175 176 177 ... 213 Next »

18%
Cloud-native application bundles for easy container deployment
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © nattapol sritongcom, 123RF.com
standard that can even be distributed from Docker Hub. Duffle Duffle (Figure 3) unabashedly refers to itself as the reference implementation of the CNAB format and provides a variety of functions
18%
The TensorFlow AI framework
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © lassedesignen, Fotolia.com
how to identify cacti in images [2]. © Kaggle Another impressive example of a dataset is the MNIST database (Figure 3), which contains nearly 60,000 handwriting samples in the form of single
18%
Samba pitfalls in daily operation
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © lightwise, 123RF.com
with authentication gives you the output from Listing 3. Listing 2 Missing ACL Query Rights root@addc-01:~# samba-tool gpo aclcheck ERROR(runtime): uncaught exception - (3221225506, '{Access Denied
18%
DNSSEC-aware DNS caching with Unbound
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Antonella Grandoni , Fotolia.com
secure-by-design stance. Unbound is a modern successor to Dan Bernstein's djbdns [3], because its design is focused on security and it includes DNSSEC. Developer NLnet Labs describes Unbound
18%
Discover system vulnerabilities and exploits
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Charles on Unsplash
tools are available for testing your own systems. Of course, I assume you will only target your infrastructure and not that of others. Many Options With an image size of about 3.5GB, Kali Linux
18%
Setting up Windows clients with Chef
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Sebastian Kaulitzki, 123RF.com
. Another tip: If you want to use Chef to manage large computer networks, you should automate the client deployment based on one of the methods featured in the Chef docs [3]. Automated Windows Configuration
18%
Hyper-V containers with Windows Server 2016
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © scyther5, 123RF.com
as a network address translation (NAT) device. The new NAT module extends the virtual switch from pure Layer 2 management to partial Layer 3 integration. With the new feature, the switch can forward network
18%
Persistent volumes for Docker containers
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Photo by Alexander Redl on Unsplash
are listed by the plugin author on the plugin page on Docker Hub [3]. If the required parameters are unclear, the Docker administrator should consult an administrator of the running Ceph cluster. As soon
18%
Make better use of Prometheus with  Grafana, Telegraf, and Alerta
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Photo by Valerie Elash on Unsplash
& Container Overview, for example (Figure 3), shows which containers run on a host and the resources they consume. Figure 3: Even if you use Docker, you
18%
Highly available storage virtualization
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Les Cunliffe, 123RF.com
-link configuration, the LUNs from the other location are also presented to all cluster nodes (Figure 3). If the local LUNs are lost, the node can access the LUNs at the other location without interruption through

« Previous 1 ... 164 165 166 167 168 169 170 171 172 173 174 175 176 177 ... 213 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice