Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 怎么用身份证号查宾馆入住信息-(⏭查询网站gpio17.com⏮)-查信息可以查到开宾馆吗-怎么查宾馆入住人员信息-去宾馆查别人住房信息-(⏭查询网站gpio17.com⏮)-怎么查宾馆入住人信息9v ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (537)
  • Article (51)
  • News (8)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 33 34 35 36 37 38 39 40 41 42 43 44 45 46 ... 60 Next »

80%
Enterprise job scheduling with schedulix
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © homestudio, 123RF.com
thousands of processes. This scenario is precisely the occasion for enterprise job scheduling. schedulix and BICsuite The open source schedulix has a commercial counterpart named BICsuite [7]. Both were
79%
Digital asset management
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Claudia, Fotolia.com
work on Debian-based servers because the pdf2swf tool is missing in the SWFTools package [7]. If you're missing this feature, you can build SWFTools from the sources
79%
Monitoring in the Google Cloud Platform
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © Maksym Chornii, 123rf.com
.google.com/cloudagents/mass-provision-google-cloud-ops-agents.py && python3 mass-provision-google-cloud-ops-agents.py --file agents_to_install.csv By the way, the Ops Agent is based on the Open
79%
Protect Hyper-V with on-board resources
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Craig Whitehead on Unsplash
. Figure 3: Enabling a secure startup of VMs in Hyper-V prevents malware from loading during the boot process. Microsoft explains the options for secure generation 2 VMs on GitHub [7
79%
Monitor applications end to end
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Photo by Adam Winger on Unsplash
. Robot Framework integrates the RobotMK extension [6] into the CheckMK monitoring system (Figure 5). CheckMK 2.3 is available in the form of the CheckMK Synthetic Monitoring [7] add-on. In all cases
79%
Recovering from a cyberattack in a hybrid environment
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Photo by Kelly Sikkema on Unsplash
365, and in particular to Entra ID, supported in the future. The Graph modules come with an extremely large number of cmdlets. If possible, you will want to use PowerShell 7 to work with Graph Power
79%
Defining measures
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Lars Kienle on Unsplash
], fdtree [6], Postmark [7], and MD-Workbench [8]. These benchmark codes test overall I/O functions such as creating and deleting, renaming, and gathering statistics. These tests are done in isolation
79%
Mobile hacking tool
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Valentina Curini on Unsplash
Play. The developers also provide qFlipper for macOS, Linux, and Windows in their download area [7]. This app can install updates and control Flipper Zero, as well (Figure 2). Also on offer
79%
Zulip, Mattermost, and Rocket.Chat
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © rll, fotolia.com
setup [7] – that take just a few minutes to complete. The Enterprise Linux (EL) setup uses a tarball image, which makes upgrading the server to new versions slightly more complex. The setup on Debian
79%
Redo Backup
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
, depending on the size of the backup, both a backup and a restore can take several hours to complete. A typical Windows 7 default install with Office but without extensive data can be backed up and recovered

« Previous 1 ... 33 34 35 36 37 38 39 40 41 42 43 44 45 46 ... 60 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice