Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (578)
  • Article (161)
  • Blog post (5)
  • News (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 ... 75 Next »

27%
Key-value stores: an alternative to relational databases
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © islander11, 123RF.com
is not necessarily wrong, but the constructs developed in this way will often turn out to be slower than a finely tuned relational database, while adding far more complexity at the code level. If you go for this kind ... Relational databases have been long-lived, but a completely different type of database, the key-value store, has established itself in the cloud market.
27%
Tools for managing AWS cloud services
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by elnaz asadi on Unsplash
in the navigation bar. In the Recently visited services or All Services list, go to the name of the service you want to add as a favorite. Click on the star to the left of the service name (Figure 2E). Learning ... of more than 200 services in the AWS cloud.
26%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© maigi, 123rf.com
of a successful hack against user data. Remote access connections and smaller web applications can be hardened for free with Google Authenticator and Mydigipass.com. Infos QTrust 2go Smart: http ... Making your systems really secure can be a bit more complicated than resorting to the use of regular passwords. In this article, we provide an overview of authentication solutions and present
26%
Designate provides DNS as a Service in OpenStack
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Gabriele Maccaroni, 123RF.com
command-line client provided is simple. Using designate domain-create --name example. com. --email email@example.com the user can create a domain (Figure 2). The tool output then displays an ID, which ... The management of DNS entries works fundamentally differently for clouds than for classic setups; OpenStack Designate is a meaningful and well-functioning DNS as a Service implementation.
26%
Intelligent observability with AI and Coroot
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by Gustavo Xavier on Unsplash
. The developers at Coroot [1] go beyond the usual intrusion detection systems (IDS) on the market today and offer a kind of artificial intelligence (AI) IDS as a service, revealing several interesting technical ... In the deep waters of scalable environments, observability is more important than ever. Coroot enters the scene with eBPF to intercept traffic and collect data that is of interest for monitoring
26%
Techniques for archiving email
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
.marqs, photocase.com
In the past few years, very few technology developments have been as versatile and necessary as email archiving. In fact, it ranks high on the best practices list of many corporations. Many ... Email archiving involves more than just backing up your email directories. It is also a question of classifying the email and making it easier for users to find their way around overfilled email
26%
ZAP provides automated security tests in continuous integration pipelines
23.08.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Galina Peshkova, 123RF.com
things automatically and in a relatively sophisticated way: $ docker run -u zap -p 5900:5900 -p 81:8080 -i owasp/zap2docker-stable x11vnc --forever --usepw --create First, you can see that, from ... Despite the abundance of tools that test code and help improve the effectiveness of a continuous integration pipeline, automated security testing is much more difficult to get right than it might
26%
Service management by the book
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Michael Flippo, Fotolia.com
" with unlimited tickets. This is definitely on the high end of what is currently being offered. h2desk A good example of SaaS, h2desk [7] is primarily marketed as a hosted product. Providing little more than ... Providing the necessary IT services to your employees or customers is more than simply logging tickets and keeping track of hardware. We compare several ITIL-compliant help desk packages.
26%
Sovereign Cloud Stack – a genuine alternative for Europe
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © solerf, 123RF.com
disguise this fact in the short term until the CJEU's next Schrems ruling, but they are no more than an all-too-obvious fig leaf. Level 2 relates to having a choice of different cloud operators and, where ... The Sovereign Cloud Stack promises no less than liberation from the shackles of vendor tie-in. Cloud users who rely on this technology are free to choose their provider and switch, without further
26%
Setting up Windows clients with Chef
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Sebastian Kaulitzki, 123RF.com
' Figure 2: The DSC Resource Kit includes dozens of status elements for PowerShell. The git command is used as before, git clone https://github.com/opscode-cookbooks/dsc.git to download the cookbook ... Chef administrators unafraid of a learning curve can employ a powerful tool for Windows client management. Teamed with PowerShell, it offers more than some system management suites.

« Previous 1 2 3 4 5 6 7 8 9 10 ... 75 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice