Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: cach hand Play Together 1.22 0(711bmw.com)cach hand Play Together 1.22 0(711bmw.com)w0e ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (210)
  • Article (20)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 13 14 15 16 17 18 19 20 21 22 23 24 Next »

9%
Cloud-native application bundles for easy container deployment
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © nattapol sritongcom, 123RF.com
"… facilitate the bundling, installing, and managing of container-native apps and their coupled services" [1] (Figure 1). The "approved deliverable" version 1.0 was made publicly available under the terms
9%
Spotlight on the Kubernetes package manager, Helm
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Nick Fewings on Unsplash
of in the context of Kubernetes. In fact, Helm comes from a completely different technical background from the package managers of classic distributions (e.g., rpm and dpkg), aiming to make distributing software
9%
Cloud-native storage for Kubernetes with Rook
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © efks, 123RF.com
/prometheus/prometheus/blob/master/documentation/examples/prometheus-kubernetes.yml Prometheus and Rook: https://rook.io/docs/rook/v0.7/monitoring.html CockroachDB:https://github.com/cockroachdb Minio:https://www.minio.io Upbound: https://www.upbound.io
9%
Discover system vulnerabilities and exploits
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Charles on Unsplash
in the form of lawsuits (e.g., for gross negligence) and fines, as well as lost revenue. Attacks can also destroy a company's reputation. What customer would want to hand over their data to a company
9%
Fight Windows ransomware with on-board tools
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by John Cameron on Unsplash
will be familiar with the problem of spam and be aware that their own address has been public knowledge for a long time. What was technically brilliant about the Locky attack [1], for example, was that the malware
9%
Workflow-based data analysis with KNIME
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Andrea De Martin, 123RF.com
to configure RProp MLP Learner so that it uses the value of this variable to determine the column with the class information (i.e., sub0, sub1, etc.). To do this, you open the configuration dialog for the node
9%
Migrate your workloads to the cloud
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Peapop, Fotolia.com
, this is best achieved if a Data Center Infrastructure Management (DCIM) system is present (e.g., NetBox [1]), which provides the relevant information at the push of a button. However, such information systems
9%
Kubernetes containers, fleet management, and applications
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Murilo Viviani on Unsplash
boundaries; that is, it rolls them out and operates them together such that a working symphony is created from individual containers. For Kubernetes to start and stop containers on the target systems, it needs
9%
Managing network connections in container environments
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Oudom Pravat on Unsplashx
to be a native Kubernetes resource and, like the other resources in Kubernetes, be manageable through its APIs. Even before the release of a formal version 1.0, the developers achieved this goal, and Traefik
9%
How to back up in the cloud
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Sgursozlu, Fotolia.com
of the platform provider, because the cloud provider does not prepare for the failure of individual components when it comes to backups. It is as much about protection against notorious fat fingering (i.e

« Previous 1 ... 13 14 15 16 17 18 19 20 21 22 23 24 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice