Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (953)
  • Article (264)
  • News (101)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 15 16 17 18 19 20 21 22 23 24 25 26 27 28 ... 133 Next »

16%
Keeping the software in Docker containers up to date
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Michal Bednarek, 123RF.com
of the IT mainstream. Production setups rely as a matter of course on the software that has breathed new life into containers under Linux and spurred other products, such as Kubernetes. From an admin's point of view
16%
Pulumi multicloud orchestrator
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Dmitriy Shpilko, 123RF.com
to the orchestrator. The orchestrator evaluates the domain-specific language (DSL) file and interprets it accordingly. The disadvantage from the administrator's point of view is that you have to learn and understand
16%
Supercharge your Website with Amazon CloudFront
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © 123RF.com
Matters At this point, it should be abundantly clear that users respond negatively to an underperforming website; therefore, it is imperative that you work to improve site performance. Slow load times can
16%
Harden your OpenStack configuration
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © zelfit, 123RF.com
point of entry for attackers is the individual VM. An attacker who gains access to a VM in the cloud can also gain access to the server if the host and the VMs are not properly isolated. A number
16%
Lithnet Password Protection for Active Directory
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © Nah Ting Feng, 123RF.com
, explicitly pointing out that you should not misuse the existing SYSVOL share replication but create a dedicated DFS replication group. Once you have decided where the database will be located, download
16%
A central access manager for SSH, Kubernetes, and others
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Andriy Popov, 123RF.com
a direct Internet connection. In return, however, such systems can no longer be accessed directly over SSH. Instead, a jump host or cluster workstation is used as a central access point from which the admin
16%
Delegate and restrict authorizations in Azure AD
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © lassedesignen, 123RF.com
. All devices lets you see whether all the devices are still required at any time. For security reasons, it may make sense to remove devices that are no longer needed. At this point, you can also adjust
16%
Setting up Google Apps for Work
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Galina Peshkova, 123RF.com
. Figure 1: The Admin console is the central contact point for Apps for Work management and can be adapted to personal needs. You will see a few menu items in the Admin console; clicking More Controls
16%
New container solutions for Linux
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Scott Griessel, 123RF.com
to create its own container platform. The ambition of the libcontainer project is to establish a universal container format for Linux that other solutions can follow. The second important point in Docker
16%
Automated orchestration of a horizontally scalable build pipeline
15.02.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
© Kittipong Jirasukhanont, 123RF
needs to be modified to point to your installation directory), and the home directory and username of the account running inside each of the virtual machines. During the following summary description

« Previous 1 ... 15 16 17 18 19 20 21 22 23 24 25 26 27 28 ... 133 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice