Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xsede%3 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1592)
  • Article (347)
  • News (206)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 168 169 170 171 172 173 174 175 176 177 178 179 180 181 ... 215 Next »

18%
Network security in the Google Cloud Platform
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Jannet Serhan on Unsplash
access Cloud NAT is a managed service and, as such, offers high availability of at least 99.9 percent. It is also regionally resilient to zone failure. Figure 3 shows the use of Cloud NAT in a global
18%
Migrating to Azure Monitor Agent
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
on the Azure portal. In a new rule, you then have the option to configure Data sources and Resources in the Configuration section (Figure 3). Resources in this example means the VM connected to the workspace
18%
Build a secure development and production pipeline
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Félix Prado on Unsplash
as they are available to update tools and technologies that help thwart hackers from exploiting underlying vulnerabilities in your applications; (3) promote automation to eliminate human involvement and reduce errors
18%
Manage containerized setups with Ansible
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Lead Image © Franck Boston, Fotolia.com
.yml Listing 2 Jinja2 Template for Router Mode Proxy location /{{ app_name }}/ { rewrite ^([^\?#]*/)([^\?#\./]+)([\?#].*)?$ $1$2/$3 permanent; proxy_pass http://127.0.0.1:{{ app
18%
Agentless automation with Event-Driven Ansible
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © Valery Kachaev, 123RF.com
documents how you can program your own source plugins [2]. Therefore, the number of available sources should increase steadily now that EDA has been officially released [3]. Spoiler: This article is based
18%
Native serverless computing in Kubernetes
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Photo by Adam Bixby on Unsplash
that outputs Hello World! [3]. The example comprises two components and is written in Go. The helloworld.go file contains the service, which listens on port 80 and prints out Hello World! in an HTTP
18%
Sharding and scale-out for databases
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Photo by Dan Dennis on Unsplash
is minimal. Even with ShardingSphere-Proxy, which according to the developers is significantly slower than the JDBC option, the performance overhead is now 25 percent less (Figure 3). This performance may
18%
Domain-driven design and agile development
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © omnimages, 123RF.com
be added on additional sticky notes of different colors. Another technique with the same objective – visualizing the flow of a business process – is known as domain storytelling [3]. In this way, DDD adds
18%
IMAP 4 protocol extensions
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Christian Draghici, 123RF.com
The CAPABILITY command [3] is not an extension but an important function of IMAP 4. The client uses it to discover which extensions the server supports. The server returns a long line that lists its capabilities
18%
Accessibility wherever you are with Mobile IPv6
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Fotograf, 123RF.com
) was developed for MIPv6. It is used by all the parties (i.e., the mobile node, correspondent node, and home agent) in messages that have to do with the management and updating of bindings. Figure 3 shows

« Previous 1 ... 168 169 170 171 172 173 174 175 176 177 178 179 180 181 ... 215 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice