Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (302)
  • Article (101)
  • News (6)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 29 30 31 32 33 34 35 36 37 38 39 40 41 42 Next »

12%
Creating a private Docker registry
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Photo by Dayne Topkin on Unsplash
Checking the Fingerprint pub rsa4096 2017-02-22 [SCEA] 9DC8 5822 9FC7 DD38 854A E2D8 8D81 803C 0EBF CD88 uid [ unknown] Docker Release (CE deb) sub rsa4096 2017-02-22
12%
Automated Azure Kubernetes Service cluster builds
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Kittipong Jirasukhanont, 123RF.com
-nodepool1-39945963-vmss000000 Ready agent 14m v1.27.7 10.224.0.4 Ubuntu 22.04.3 LTS 5.15.0-1051-azure containerd://1.7.5-1 You can see an internal IP address, the version of the Ubuntu Linux node
12%
HPC Data Analytics
08.08.2014
Home »  HPC  »  Articles  » 
Description Source Statistics Analyze and model data using statistics and machine learning [http://www.mathworks.com/products/statistics/?s_cid=sol_des_sub2_relprod3_statistics
12%
Let the editor wars begin!
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Kirill Makarov, 123RF.com
for another editor. ex Ex [1] was written by Bill Joy [2] in 1976 as something of a replacement for the original *nix editor named ed [3] (ed was developed in 1969). Bill Joy modified a development of ed
12%
HPCCM with Docker and Podman
09.09.2024
Home »  HPC  »  Articles  » 
to maintain than a long specification file, and because it’s Python, you can use any Python code or tools as part of the recipe. The recipe uses “building blocks” for capabilities such as compilers, libraries
12%
Server virtualization with Citrix XenServer
04.08.2011
Home »  CloudAge  »  Articles  » 
 
in the 1970s have now found their way into classic x86 hardware. Multicore systems with sufficient RAM can easily run a handful of virtual server systems today. This capability not only reduces power and space
12%
OpenFlow-capable Zodiac WX access point
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Photo by Florian Biedermann on Unsplash
a beta test for a new product: Zodiac WX [2], a wireless-enabled access point. A special feature of the Zodiac WX is support for the OpenFlow protocol [3]. OpenFlow-based networks usually exist purely
12%
Professional PowerShell environments
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © lightwise, 123RF.com
Windows Service as the project. 2. Create a runspace with the System.Management.Automation.Runspaces namespace. 3. Create the payload (i.e., the source code). 4. Install the service with install
12%
Server virtualization with Citrix XenServer
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Goss Vitalij, Fotolia
/** 16 * @param args 17 */ 18 public static void main(String[] args) throws Exception { 19 20 if (args.length != 3 && args.length != 5) 21 { 22 System
12%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© sTan, fotolia.com
. Tokens and Certificates Of course, the VPN dial-up no longer uses a simple pre-shared key (PSK) but, instead, uses secure, centrally manageable X.509 certificates [3] that automatically expire. You can

« Previous 1 ... 29 30 31 32 33 34 35 36 37 38 39 40 41 42 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice