Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: opens ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1126)
  • News (395)
  • Article (298)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 167 168 169 170 171 172 173 174 175 176 177 178 179 180 ... 183 Next »

18%
Databases in the Google Cloud
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Jon Parry on Unsplash
predictions are easy to learn and can be handled with normal SQL syntax. Typical fields of application are recommendation systems or regression analyses. With BigQuery Omni, Google has opened up to other cloud
18%
Protect Hyper-V with on-board resources
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Craig Whitehead on Unsplash
, the results are also available in the GUI. Once you have started the BPA check, you will see the results on the individual tiles in the Server Manager. You can open them by clicking on a tile. If you click
18%
Protecting the production environment
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Intricate Explorer on Unsplash
with a Git and the necessary hooks are not part of the open source variant of Puppet but can be easily replicated by experienced admins. Hiera: Separating Code and Data Hiera also is usually maintained
18%
How persistent memory will change computing
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © rangizzz, 123RF.com
XPoint under the Optane brand in the form of SSDs. Recently, Intel gave a demonstration of these SSDs at the OpenWorld conference, hosted by Oracle. The results were summarized in an article online [3
18%
Encrypted backup with Duplicity
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Boing, Photocase.com
the backups in various cloud services, including Dropbox, Azure, OpenStack Swift, and Amazon S3, along with a couple of quirky storage memory options such as sending email. Almost every new release of Duplicity
18%
Legally compliant blockchain archiving
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Photo by Jade Masri on Unsplash
the respective document to prove its integrity. During development, care was taken not to use components whose use is marketed under commercial licenses (i.e., only open source products). The core
18%
New storage classes for Amazon S3
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © stillfix, 123RF.com
= boto3.resource('s3') s3.Object ('mybucket', 'hello.txt').put(Body=open('/tmp/hello.txt', 'rb'), StorageClass='STANDARD_IA') Cheap Storage with Glacier Deep Archives Of the six main storage classes
18%
Build operating system images on demand
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © Nataliya Hora, 123RF.com
in OpenStack, have managed with around 260MB for years. Bare Metal If you want to build an image for use on bare metal instead, the effort is not much greater. Although a separate option displays
18%
Understanding Layer 2 switch port security
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Taffi, Fotolia.com
can use macof [2], which is preinstalled on Kali Linux, to implement the MAC flooding attack. Simply open the command console and type macof -e [interface] to start the attack. Listing 1 generates
18%
Efficient password management in distributed teams
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © Sergey Nivens, 123RF.com
and changing this password. However, a password-free solution is also possible and can even be built with a few open source tools. A Trip to GnuPG One of the tools used is GNU Privacy Guard (Gnu

« Previous 1 ... 167 168 169 170 171 172 173 174 175 176 177 178 179 180 ... 183 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice