Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (460)
  • Article (53)
  • News (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 17 18 19 20 21 22 23 24 25 26 27 28 29 30 ... 52 Next »

10%
New plans for Jenkins
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Juergen Priewe, 123rf.com
a minimum viable product (MVP, i.e., a slimmed down prototype) that will consist of a FaaS-like build engine that Jenkins X could use. In this way, the MVP would bring together existing projects
10%
Web applications with Julia
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © sony sivanandan, 123RF.com
22 ztable = join(ztable) 23 p = plot([f1 f2]; xrange=(0, 1), lc=[lc1 lc2], lw=2, xlabel="x", ylabel="y", label=["cos($c x)" "$(t)tan(x)"]) 24 show(io, MIME"image/png"(), p) 25
10%
The new version of Chef Automate comes with many new features
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Rock'n Roll Monkey on Unsplash
or pieced together in scripts. The idea that automation could play a role in the CI/CD context did not develop until the advent of Docker and the like, when containers became the focus of interest ... Chef, one of the oldest automation solutions, seeks to become a universal administration robot for cloud environments with new version 2.0. ... Chef Automate 2.0
10%
Five Kubernetes alternatives
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © alphaspirit, 123RF.com
Kubernetes [1] is king of the hill in the orchestration universe. Invented by Google and now under the auspices of the Linux Foundation, Kubernetes has not only blossomed quickly but has led
10%
Managing BitLocker with PowerShell
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © sergey Mayorov, 123RF.com
to this drive need to enter the password in Explorer or use the Unlock-Bitlocker cmdlet with the password. Again, the assumption is that you stored it in the $PassW variable: Unlock-Bitlocker -MountPoint "E
10%
Coordinating distributed systems with ZooKeeper
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © smileus, 123RF.com
/test [zk: localhost:2181(CONNECTED) 11] get /test HelloWorld! cZxid = 0xa1f54 ctime = Sun Jul 20 15:22:57 CEST 2014 mZxid = 0xa1f54 mtime = Sun Jul 20 15:22:57 CEST 2014 pZxid = 0xa1f54 cversion = 0
10%
Hyper-V with the SMB 3 protocol
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Vladimir Kramin, 123RF.com
, Microsoft no longer uses the term CIFS, because the original extensions were developed for SMB 1.0, and they no longer play a role in SMB 2.0. SMB 2.1 mainly offers performance improvements, especially
10%
Three full-text desktop search engines
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by Lucas Gallone on Unsplash
/2020/11/05/tracker-3-0-where-do-we-go-from-here/ SPARQL 1.1 Overview: https://www.w3.org/TR/sparql11-overview/ Tracker CLI documentation: https
10%
Configuring Windows with NetShell
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Kirsty Pargeterr, fotolia.com
, Windows provides a corresponding NetShell helper to let you control the service via NetShell. A Question of Context NetShell [1] can be used in two ways: On the one hand, you can call each Net
10%
Portable home directory with state-of-the-art security
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © SOMYOT TECHAPUWAPAT , 123RF.com
. Encryption by means of a certificate or multifactor access control (e.g., FIDO2 in addition to the password) is more useful, preventing data leaks even if the stick and the password fall into the hands

« Previous 1 ... 17 18 19 20 21 22 23 24 25 26 27 28 29 30 ... 52 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice