Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1238)
  • Article (265)
  • News (87)
  • Blog post (7)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 13 14 15 16 17 18 19 20 21 22 23 24 25 26 ... 160 Next »

38%
IPv6 security on IPv4-only networks
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © foottoo, 123RF.com
software does not support IPv6. Firewalls play a key role in managing these scenarios. Most attack vectors can be closed down by blocking undesirable native IPv6 traffic and tunnel traffic and by disabling
38%
The TensorFlow AI framework
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © lassedesignen, Fotolia.com
to look at TensorFlow from a different perspective: What does the program do for developers, and which problems can it help solve? To understand this, you must understand some more technical terms: What
38%
Key-value stores: an alternative to relational databases
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © islander11, 123RF.com
installation. Unlike OpenStack, Kubernetes does not build large and complex tables with innumerable entries (e.g., for storage or IP addresses it has created). Instead, Kubernetes follows the approach of simply
38%
Balancing Work and Life as a Sys Admin
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © astyf, 123RF.com
but vehemently protects her off-duty time. Did I also mention that she prevents her boss, coworkers, and customers from creating a toxic work environment? She does, and she does so in a calm, professional, and non
38%
Hardening mail servers, clients, and connections
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by jesse ramirez on Unsplash
. Therefore, network users have to live with the disadvantages and various negative effects that come with email. Some smaller companies outsource the problem to service providers such as Microsoft or Google
38%
Gleaning Agile Methodology for Infrastructure Projects
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © liudmilachernetska, 123RF.com
the good people at Company X, they'll tell you that it, in fact, does not work for them either. They tolerate it because they must. Agile has one positive outcome, and that is it does keep infrastructure
38%
Tinkerbell bare metal deployment
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Photo by engin akyurt on Unsplash
software to the system. Moreover, this problem does not just arise in the context of the initial installation of a system. In line with the automation maxim that if someone has to log in, you need
38%
Sync identities with Microsoft Identity Manager
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © alphaspirit, 123RF.com
to be transferred, but MIM can also work with other data sources. This does not need to be a directory service such as the Microsoft AD or Novell eDirectory. Text files, or an SQL Server that contains user data
38%
Zero Trust as a security strategy
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Jack Dong on Unsplash
Corp I want to take the wind out of the sails of an argument often raised against the BeyondCorp principle right from the start: Google's solution does not mean that admins completely dispense ... Acceptance of zero trust models like BeyondCorp by Google or LISA by Netflix lags in Europe, where endpoint security is king. We examine why this situation must change by looking into the principles
38%
Troubleshooting and maintenance in Ceph
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © KrishnaKumar Sivaraman, 123RF.com
@daisy:/etc/ceph/keyring.admin /etc/ceph on Charlie does the trick. You can carry out all further steps of the instructions on Charlie just by copying; however, if that does not work, you would need to switch constantly between one

« Previous 1 ... 13 14 15 16 17 18 19 20 21 22 23 24 25 26 ... 160 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice