Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (354)
  • Article (87)
  • News (7)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 32 33 34 35 36 37 38 39 40 41 42 43 44 45 Next »

27%
The AWS CDK for software-defined deployments
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © krisckam, 123RF.com
Kubernetes Service (AKS) [3], make it possible to provision immensely complex orchestration platforms and tools with point-and-click web interfaces or a simple command-line invocation. In this dimension, many
27%
CloudStack's Chip Childers
29.10.2013
Home »  Articles  » 
 
, but with Apache CloudMonkey 5.0.0, the CLI can actually query the API endpoint of the target cloud and automatically discover the capabilities of that environment. Apache CloudStack 4.2 and will be out by the time
27%
CloudStack Up Close
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
CloudMonkey and CloudStack were tightly coupled, but with Apache CloudMonkey 5.0.0, the CLI can actually query the API endpoint of the target cloud and automatically discover the capabilities
27%
News for Admins
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
 
is, the fewer vulnerabilities it is likely to have. According to the report, container images smaller than 100MB had 4.4 high or critical vulnerabilities, versus 42.2 for images between 250 and 500MB ... and Management Software; LPI Launches Open Source Essentials Program; Apache Software Foundation Celebrates 25 Years; SUSE Announces Rancher Prime 3.0; NSA Issues Zero Trust Guidelines for Network Security
27%
Outfitting an IT training environment with Docker containers
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Kamonrat Meunklad, 123RF.com
, and modifies the .bash_profile for the new users, as shown in Figure 3. The sudo utility is not required for the user to start a Docker container. Figure 3
27%
Monitor Windows systems and Linux servers
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Shao-Chun Wang, 123RF.com
, with the modular licensing scheme, choose the services they need. (See also the "Testing OMS Free of Charge" box.) Testing OMS Free of Charge If testing 500MB of daily upload is sufficient for logfiles
27%
Why Good Applications Don't Scale
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © man64, 123RF.com
. That means the serial portion is 1 - p , so the asymptote is the inverse of the serial portion of the code, which controls the scalability of the application . In this example, p = 0.8 and (1 - p ) = 0.2, so
27%
A script for strict packet filter updates
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © french 03, photocase.com
by one of the five regional Internet registries (RIRs). The American Registry for Internet Numbers (ARIN) [3] is responsible for the US, Canada, parts of the Caribbean, and Antarctica, whereas The RIPE
27%
HTML to database with a Perl script
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Danila Krylov, 123RF.com
="menu"> 08 09 10 11 12 13 14 15
27%
Enterprise job scheduling with schedulix
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © homestudio, 123RF.com
in this way exist on the market, including IBM Tivoli Workload Scheduler [2], Entire Operations [3] by Software AG, or BMC's Control-M Suite [4]. All told, the number of available solutions with and without

« Previous 1 ... 32 33 34 35 36 37 38 39 40 41 42 43 44 45 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice