Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (339)
  • Article (86)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 Next »

13%
Simple OpenStack deployment with Kickstack
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Mechanik, Fotolia.com
is of fundamental importance to understanding the way Kickstack or Packstack [3] work (see the "Kickstack vs. Packstack" box). Table 1 lists the nine core components of OpenStack. Table 1 Open
13%
Secure Kubernetes with Kubescape
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © limbi007, 123RF.com
in a worst case scenario. To ensure that containerland does not turn into a horror movie, companies need to bear a few things in mind when they look to operate a large number of containers. After all
13%
Tracing applications with OProfile and SystemTap
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© boing, Photocase.com
. Infos OProfile project homepage: http://oprofile.sourceforge.net/news Kernel debuginfo information: http://fedoraproject.org/wiki/StackTraces#What_are_debuginfo_rpms.2C_and_how_do_I_get_them.3F
13%
Centralized Password Management
06.08.2013
Home »  Articles  » 
 
, electronic cards, and various types of biometrics have not changed this. There is virtually no alternative to passwords: Low implementation costs, sufficiently high user acceptance, and the relative rarity
13%
Requirements for centralized password management
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
ccvision
, electronic cards, and various types of biometrics have not changed this. There is virtually no alternative to passwords: Low implementation costs, sufficiently high user acceptance, and the relative rarity
13%
New features in MariaDB 10.3
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image by Adarsh Kummur on Unsplash
# sudo apt-get install software-properties-common # sudo apt-key adv --recv-keys --keyserver hkp://keyserver.ubuntu.com:80 0xF1656F24C74CD1D8 # sudo add-apt-repository 'deb [arch=amd64,arm64,ppc64el] http ... What lacked maturity in MariaDB 10.2 has now been sorted out in version 10.3. We look at the benefits you can reap now. ... MariaDB 10.3 ... New features in MariaDB 10.3
13%
Desktop Supercomputers: Past, Present, and Future
17.03.2021
Home »  HPC  »  Articles  » 
, but it only used a maximum of 1,600W. The blades had up to eight DDR3 DIMM slots along with two 2.5-inch SATA hard drives (HDDs) and a single x16 PCIe port. You could have a one-slot blade with four connected
13%
Tricking Intruders with HoneypotMe
26.10.2012
Home »  Articles  » 
 
is not sufficient to ensure reliable detection of all current malware. New Methods To detect the propagation of this kind of malware on monitored networks, other detection methods, such as honeypots, are required
13%
Hardware suitable for cloud environments
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Orlando Rosu, 123RF.com
of $240K (EUR192K), bottom line. In return, however, the SSD-based Ceph cluster is seriously fast, gets by without caching hacks, and offers all the other advantages of SSDs (Figure 3). The additional
13%
Spanning Tree Protocol
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
of 12. Figure 5: For 100Mb lines between all ports, the value of 19 applies to all route costs, except for the bundled cables between Switches 3 and 4

« Previous 1 ... 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice