Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (265)
  • Article (48)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 23 24 25 26 27 28 29 30 31 32 Next »

11%
Secure access to Kubernetes
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Zachery Blanton, 123RF.com
treats both human users and service accounts in the same way after authentication, in that, during authorization and access control, it makes no difference whether jack@test.com or databaseservice wants
11%
Understanding Cybersecurity Maturity Model Certification
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Braden Collum on Unsplash
-5) that composed the CMMC framework, with level 1 being the least mature and level 5 the most mature. The CMMC 1.0 framework consisted of 17 cybersecurity domains. A domain is a distinct group of security practices
11%
Secure cloud-native services with Prisma Cloud Compute
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © alexmillos, 123RF.com
.docker.com/install/linux/docker-ce/ubuntu/#install-docker-engine---community-1 Twistlock AuthZ Broker: https://github.com/twistlock/authz Twistlock Jenkins plugin: https://www.twistlock.com/2018/05/09
11%
Parallel Programming with OpenMP
21.11.2012
Home »  HPC  »  Articles  » 
(unew(i,j)-u(i,j)) ) 141 ENDDO 142 ENDDO 143 144 IF(MOD(iter,10)==0) WRITE(*,"('iter,diff:',i6,e12.4)") iter,diff 145 146 ! Update solution 147 DO j=2,m-1 148 DO i=2,m-1 149 u(i,j) = unew
11%
Darshan I/O analysis for Deep Learning frameworks
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Michaela Murphy on Unsplash
08 integer :: counter 09 integer :: counter_limit 10 integer :: ierr 11 12 type(rec) :: my_record 13 14 counter_limit = 2000 15 16 ierr = -1 17 open(unit=8,file
11%
Aggregating information with Huginn
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © it Ilka Burckhardt, Fotolia.com
"href": "http://www.linux-magazine.com/NEWS/Gartner-worldwide-server_sales_drop" 08 } 09 ], 10 "title": "Gartner: Worldwide server sales drop", 11 "content": "
11%
Program from one source to many apps with Flutter
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Pynkhlainborlang Khongwar on Unsplash
WorldApp extends StatelessWidget { 08 @override 09 Widget build(BuildContext context) { 10 return MaterialApp( 11 title: 'Hello World', 12 home: Scaffold( 13 appBar: AppBar( 14
11%
Microsoft Exchange replacement
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Gabriel Crismariu on Unsplash
yellow 07 continue 08 } 09 Write-Host "" 10 11 [...] 12 13 Write-Host "Removing all MailboxExportRequests." -fore green 14 Get-MailboxExportRequest | Remove-MailboxExportRequest -Confirm
11%
Sharing Linux Terminals
13.07.2022
Home »  HPC  »  Articles  » 
_64-dvd1.iso --2022-07-06 12:48:08--  https://download.rockylinux.org/pub/rocky/8/isos/x86_64/Rocky-8.6-x86_64-dvd1.iso Resolving download.rockylinux.org (download.rockylinux.org)... 146.75.82.132, 2a04:4e
11%
New storage classes for Amazon S3
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © stillfix, 123RF.com
) ≥3 Glacier Deep Archive Data archiving for barely used data with a recovery time of 12 hours 99.999999999 99.99 (after restore) ≥3 RRS (no longer

« Previous 1 ... 23 24 25 26 27 28 29 30 31 32 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice