Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1550)
  • News (737)
  • Article (313)
  • Blog post (9)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 202 203 204 205 206 207 208 209 210 211 212 213 214 215 ... 261 Next »

36%
Test mechanisms for best practices in cloud design
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Lead Image © Zlatko_Guzmic, 123RF.com
, accordingly, base further development of the architecture on the facts by collecting metrics for the change process. Each new version of the architecture provides new data points on which organizations can
36%
Archiving teams and channels
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Adis Corovic on Unsplash
is connected. In the Files menu, you can see the connected storage in Teams, such as storage in SharePoint Online. You can select Add cloud storage to connect external providers (e.g., Google Drive, Dropbox
36%
Baselines are more important than  the  benchmark
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © Lucy Baldwin, 123RF.com
to serve secured content. Figure 3 shows as example test with Google's search engine as the endpoint, historically one of the Internet's snappiest endpoints. Results are provided for new sessions as well
36%
SoftEther VPN software
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Marc Sendra Martorell on Unsplash
in the Client Manager and assign a name, the server data, the virtual network adapter to be used, and the access data to the connection in the associated New VPN Connection Setting Properties dialog. If required
36%
IT automation with SaltStack
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Harry Cunningham on Unsplash
In 2013, we were faced with a move to a new data center, combined with a change in infrastructure – away from classic bare-metal servers to well-dimensioned virtual machines (VMs). Until then
36%
Accessing Fortran code with Python
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Kheng Ho Toh, , 123RF.com
new Fortran routines that use OpenMP to take advantage of all of the CPU cores, you would make much better use of computational resources. Previously, I wrote an article that introduced the concept
36%
Container IDE with cloud connection
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Photo by Christin Hume on Unsplash
important things. This is where Gitpod [1] comes in. One Pod, One Word The technology behind Gitpod picks up on relatively new developments from the open source scene. Besides Docker, it uses the Eclipse
36%
Cron alternatives fcron and hcron
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © stillfx, 123RF.com
in the GUI, you can see whether the fcron daemon is currently running. Next to that, select the user for whom you want to create new tasks. After a right-click on the input area, create a new task by selecting
36%
Scale Your Docker Containers with Docker Swarm
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Author, 123RF.com
is simple: docker service create instructs Docker you're creating a new service. -p 80:80 instructs Docker to use external port 80 for the service and route it to internal (within the container) port
36%
Using the ATA security features of modern hard disks and SSDs
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © braverabbit, 123RF.com
-disable "UltraSecret" /dev/sdb In terms of ATA states, a transition from SEC5 to SEC1 occurs. Now you can assign a new user password. The ATA standard specifies two different security levels that are defined

« Previous 1 ... 202 203 204 205 206 207 208 209 210 211 212 213 214 215 ... 261 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice