Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (196)
  • Article (77)
  • News (13)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 14 15 16 17 18 19 20 21 22 23 24 25 26 27 ... 29 Next »

26%
Next-generation terminal UI tools
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © Lucy Baldwin, 123RF.com
of terminal user interface (TUI) libraries, including Ncurses [3] and Newt [4]. Jeff Layton has previously graced these pages with a tutorial on how TUI tools are developed today [5], and yours truly followed
26%
Finding Your Way Around a GPU-Accelerated Cloud Environment
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © Lucy Baldwin, 123RF.com
) is currently based [3]. It has been replaced since by ec2-metadata [4] as Canonical decided to standardize on Amazon's implementation of the tool beginning with Groovy Gorilla (20.10). Documentation indicates
26%
The Aurora Mesos Framework
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Anton Gvozdikov, 123RF.com
by Twitter, and Google was at least indirectly an inspiration for the project. The beginnings of Aurora date back to 2010. Bill Farner, a member of the research team at Twitter, launched a project
26%
Working with the Exchange Management Shell
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © silvae, 123RF.com
Identity){"$PosIdentity was not found!";Exit 2} ElseIf {(-NOT(validate $PosUser){"$PosUser was not found!";Exit 3} Else{ $ErrorActionPreference="stop"; #Dynamic change begins trap {"Error in the allocation. `n let's try the other
26%
Manage resources with AWS CloudFormation
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © krisckam, 123RF.com
Press database name", "Type": "String", "MinLength": "1", "MaxLength": "64", "AllowedPattern" : "[a-zA-Z][a-zA-Z0-9]*", "ConstraintDescription" : "must begin with a letter and contain only
26%
Zero trust planning and implementation
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © magiceyes, 123RF.com
The zero trust model was published in 2010 by John Kindervag, who was employed by IT analysts Forrester Research at the time. However, the foundations for zero trust were laid down as early as 1994
26%
Web applications with Flask
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Photographer, 133RF.com
. An alternative to Django is Flask [1], which has become increasingly popular since its inception in 2010. The advantage of Django is that it comes with more or less everything you need for many web applications
26%
Unicode migration with an Oracle database
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© joingate, 123RF.com
) is entered in the database as 0xA4 – if you create the database with the ISO-8859P15 character set. However, if the database was created with a Unicode character set, then the Euro sign is stored as a three
26%
Dispatches from the world of IT
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
 
into one unified platform that runs on commodity hardware, freeing users from restrictive and proprietary storage solutions. Ceph was integrated into the mainline Linux kernel in 2010 and into Ubuntu 12
26%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bluebay, 123rf.com
an attacker's (red team) point of view. Figure 3: Metasploitable, an extremely vulnerable version of Linux, offers good attack vectors. Since around 2010

« Previous 1 ... 14 15 16 17 18 19 20 21 22 23 24 25 26 27 ... 29 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice